ApiHookChain
Run
Static task
static1
Behavioral task
behavioral1
Sample
26b507b3e65c5345a161552fbfd1b295.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26b507b3e65c5345a161552fbfd1b295.dll
Resource
win10v2004-20231215-en
Target
26b507b3e65c5345a161552fbfd1b295
Size
32KB
MD5
26b507b3e65c5345a161552fbfd1b295
SHA1
fc070554dea11068295f2c33d3c5955fe1b31a2d
SHA256
2cd82dab3db60ffbcaef80b1ea701d479a6c3e7810d251b0b6a17b628da9356a
SHA512
25c874a406620c0b0d336356c8c59fdbd68a277826c0bc409a934da322f6b68fc168dd4b1b6435602973b663e2108a0a3077ffbaec5053a36143864a012e6b9f
SSDEEP
768:cKGMhIFkHAoM7zympZ5hulCSeHsE19JMDR9gJyMt/:bGZ/y6Z5IlosE19JMDRbMt
Checks for missing Authenticode signature.
resource |
---|
26b507b3e65c5345a161552fbfd1b295 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
InternetOpenA
GetFileVersionInfoA
ord3811
ftell
wsprintfW
RegCreateKeyA
SetupIterateCabinetA
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Netbios
ApiHookChain
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE