GetDLlVersion
Prevx1
Run
Static task
static1
Behavioral task
behavioral1
Sample
3b4f2868578ac2db82833184ab1638d9.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3b4f2868578ac2db82833184ab1638d9.dll
Resource
win10v2004-20231215-en
Target
3b4f2868578ac2db82833184ab1638d9
Size
56KB
MD5
3b4f2868578ac2db82833184ab1638d9
SHA1
c7e916f871d729d31d14bf25a2073a15bd673090
SHA256
c254e7a9763bf05b06d011e18ac75b503e69fca892082a98e540587835a83864
SHA512
f5635d9edf0daa6791a73dabf90fc8f01dd5e21c28181c85e69febe87fda48add9a5cb63d726a699dfd7a871963448a68b687d6a73b88afac6119bf3079633f2
SSDEEP
768:zugddQy3a23By5kQ80Y3hT21SV9VV9qSQ4AGtfiB9IsidP40zgKXk5TsQPbD:zugWyKi0ahTKmVV9qS8G9R7Ws4
Checks for missing Authenticode signature.
resource |
---|
3b4f2868578ac2db82833184ab1638d9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
TerminateProcess
GetLastError
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
CreateProcessA
SetEnvironmentVariableA
Sleep
RtlUnwind
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
CloseHandle
WriteFile
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetProcAddress
GetModuleHandleA
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
SendMessageA
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
OpenDesktopA
EnumChildWindows
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SHGetSpecialFolderPathA
WSACleanup
gethostbyname
WSAStartup
connect
setsockopt
socket
htons
send
recv
closesocket
shutdown
inet_addr
GetDLlVersion
Prevx1
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ