DllMain
WLEventStartShell
Static task
static1
Behavioral task
behavioral1
Sample
267df394b74f69ebfbf692097e912f00.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
267df394b74f69ebfbf692097e912f00.dll
Resource
win10v2004-20231222-en
Target
267df394b74f69ebfbf692097e912f00
Size
21KB
MD5
267df394b74f69ebfbf692097e912f00
SHA1
00fefcc614d309caa116095431746a4ab600af52
SHA256
9fd239477282a56eb09bbb34e0f1c4fb82897529026550e78f58eefa449bd3f8
SHA512
ba8334da68d9971d07e8b31625ce78adc59ee60f403bf8343b24384c1d708ad4aa25f352423837024b6fd9182354b5cd06fe8b286eee0845e89a1587b569c42a
SSDEEP
384:5x4P4rBFSs97pi+BnCklUa+1z1zjUbmxmdKBSfvXnP+csXY:5xA0W+BnCkiL1p2mxDSnnPtsI
Checks for missing Authenticode signature.
resource |
---|
267df394b74f69ebfbf692097e912f00 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
GetEnvironmentVariableA
GetThreadContext
ReadProcessMemory
ResumeThread
SetThreadContext
VirtualAllocEx
WriteProcessMemory
lstrcatA
lstrcpyA
DllMain
WLEventStartShell
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ