_GetFunctionAddr@20
_NewHook@12
_OutputConsole@4
_OutputDWORD@4
_OutputRegister@4
_RegisterEngineType@4
_RegisterHookName@8
_RemoveHook@4
_SwitchTrigger@4
Static task
static1
Behavioral task
behavioral1
Sample
4175deef8cf32276eb1072b2d200887a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4175deef8cf32276eb1072b2d200887a.dll
Resource
win10v2004-20231215-en
Target
4175deef8cf32276eb1072b2d200887a
Size
23KB
MD5
4175deef8cf32276eb1072b2d200887a
SHA1
2122ab9513f3d8d589338e5bd2e3eb774c3c78a2
SHA256
e7e0ab67dd2bcd77c35325ac062116f056bd1452e4c0b88d169181227e9ddadc
SHA512
68b77433fc09a1119347d75ea600b6cf206a72440b81a73c50a954ecf42e40947e8b7cbd3c29dabcfc21c2ee51e32bfdce17b6eb57af113f66010c8d1b04cac4
SSDEEP
384:4O2yVxZX2487UfkbN/qtw19rtF5k/SlArOvJ+Ka07Sn5aQm3tZKwU4SHjZZY6EU:4X48wfM19rT5k/SlAri+puwcQMUVjZGU
Checks for missing Authenticode signature.
resource |
---|
4175deef8cf32276eb1072b2d200887a |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wcsrchr
_wcslwr
_wcsicmp
swprintf
_stricmp
memcpy
memset
NtResumeThread
NtSetEvent
NtQuerySystemTime
NtTerminateThread
RtlCreateHeap
NtCreateThread
NtAllocateVirtualMemory
NlsAnsiCodePage
NtOpenEvent
NtOpenDirectoryObject
RtlSetHeapInformation
RtlTimeToTimeFields
NtCreateEvent
NtCreateMutant
NtGetContextThread
NtOpenFile
NtCreateSection
NtQueryVirtualMemory
NtFlushBuffersFile
NtFlushInstructionCache
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadFile
NtReleaseMutant
NtCreateFile
NtClearEvent
RtlInitUnicodeString
NtDelayExecution
RtlAllocateHeap
NtClose
NtWaitForSingleObject
NtUnmapViewOfSection
RtlFreeHeap
NtMapViewOfSection
NtWriteFile
LdrDisableThreadCalloutsForDll
RtlDestroyHeap
DrawTextW
DrawTextA
DrawTextExW
DrawTextExA
GetCharABCWidthsW
TextOutA
ExtTextOutA
GetGlyphOutlineW
GetCharABCWidthsA
ExtTextOutW
GetTextExtentPoint32A
GetTextExtentPoint32W
GetGlyphOutlineA
TextOutW
_GetFunctionAddr@20
_NewHook@12
_OutputConsole@4
_OutputDWORD@4
_OutputRegister@4
_RegisterEngineType@4
_RegisterHookName@8
_RemoveHook@4
_SwitchTrigger@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ