Hook
Unhook
Static task
static1
Behavioral task
behavioral1
Sample
23102ea19f993634a2be0323d3bccc96.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23102ea19f993634a2be0323d3bccc96.dll
Resource
win10v2004-20231215-en
Target
23102ea19f993634a2be0323d3bccc96
Size
4KB
MD5
23102ea19f993634a2be0323d3bccc96
SHA1
d2ad81ce0ac3c68d12b1de7e9a3c0be71880ba35
SHA256
5c817691e5b2f42445d925c3cfe789af6348694673d86160c340ac4daf6ea4d9
SHA512
68e6d5f5de297257fc91c43e015be9bb5dba8d1ff995797008b0610e8169a2d43a2c8f44aa97b7257427275dfc8cea1b4906d626dea262ce1f43a920a1807e0c
SSDEEP
48:aLSCqWYEECD4883HfhqIjFM3aGkH8lTc:H8D2Pt7H8lT
Checks for missing Authenticode signature.
resource |
---|
23102ea19f993634a2be0323d3bccc96 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
WriteProcessMemory
EnterCriticalSection
Beep
ReadProcessMemory
GetProcAddress
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
GetProcessHeap
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
Hook
Unhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ