?InstallHook@@YAXPAUHWND__@@@Z
?UninstallHook@@YAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
2312d1738dc57ae0f1e17db95784beb3.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2312d1738dc57ae0f1e17db95784beb3.dll
Resource
win10v2004-20231215-en
Target
2312d1738dc57ae0f1e17db95784beb3
Size
180KB
MD5
2312d1738dc57ae0f1e17db95784beb3
SHA1
c12cfc1bbda6334faa1194e55ff2dba9bd470f52
SHA256
e21f9c5c8c3a2200f453b0832d29e9f5c16412389e16f3343cae956af1c676ed
SHA512
7b7b151e5d6e9fc096c730a8367070fd09a4809b71967f41ccc68e539a468fe76d15299f5ba7f0176876a2ef050fb767331ab42c63aa95fad034561cbe9af0d9
SSDEEP
3072:byRiacQpmhiJ7G47dh7ScDasTpcE42mD3jL52thijAWzA:WRijoJ7GQdh7Sjs02mDZai
Checks for missing Authenticode signature.
resource |
---|
2312d1738dc57ae0f1e17db95784beb3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
Sleep
GetStdHandle
VirtualFree
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
RtlUnwind
GetCommandLineA
VirtualAlloc
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
RaiseException
GetACP
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalFlags
GetThreadLocale
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
InterlockedIncrement
GetCurrentThreadId
CloseHandle
FreeLibrary
InterlockedDecrement
GetModuleHandleA
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
GetCurrentProcessId
GetModuleFileNameA
SetLastError
LockResource
SizeofResource
FindResourceExA
LoadResource
FindResourceA
GetCurrentProcess
GetVersion
CompareStringA
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GetEnvironmentStringsW
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
UnhookWindowsHookEx
PostMessageA
SetWindowsHookExA
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
GetForegroundWindow
GetWindowTextA
CallNextHookEx
GetClassNameA
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
SetWindowTextA
ClientToScreen
DestroyMenu
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetMenuState
ValidateRect
PeekMessageA
GetKeyState
PostQuitMessage
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
DispatchMessageA
SaveDC
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
ExtTextOutA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SelectObject
SetBkColor
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
VariantClear
VariantChangeType
VariantInit
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetQueryDataAvailable
InternetConnectA
CreateStdAccessibleObject
LresultFromObject
?InstallHook@@YAXPAUHWND__@@@Z
?UninstallHook@@YAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ