?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
3f6e507ac45c3964ab05e016ecbeb875.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f6e507ac45c3964ab05e016ecbeb875.dll
Resource
win10v2004-20231215-en
Target
3f6e507ac45c3964ab05e016ecbeb875
Size
15KB
MD5
3f6e507ac45c3964ab05e016ecbeb875
SHA1
05211016038d40cf26920055e785c604a86159c1
SHA256
c5de3d09619cafb9ff42e537d52bbaa3c841660a6da642380a1a87fe2406b353
SHA512
33c9bd7ba093acc7a076d640a6b8d70ee61bf7dfd040c59a91b3a64008eeaf407cfc0cdd1a63227a64d263a4eb799970344e03876857b2c74cea056e8ed9a432
SSDEEP
384:q6cqcwmM3e41YOz0a5hC/WwJDTpWvXGNH:KqcwmM3YSIWKf0XGx
Checks for missing Authenticode signature.
resource |
---|
3f6e507ac45c3964ab05e016ecbeb875 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord4698
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE