HookProc
ddd
eee
Static task
static1
Behavioral task
behavioral1
Sample
4339608ad0a4ec2234a0693c38a8412e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4339608ad0a4ec2234a0693c38a8412e.dll
Resource
win10v2004-20231215-en
Target
4339608ad0a4ec2234a0693c38a8412e
Size
24KB
MD5
4339608ad0a4ec2234a0693c38a8412e
SHA1
bfcfd704a1e82f94e0dde4d3d29ad8f0ad54bde6
SHA256
9f7df6c702cd21648081b7fbb5b94bfbbc5630ad46b8d06352be6b3dd0729f36
SHA512
dbf511a9aac29c15a733df75e428cc43db18a693bde698300f2a43992f17849a6f27bcae63af7ea536f4aa60c7027d8c145ef3d7bd209e2283d365f35d062040
SSDEEP
384:y5FgsfNt/1BxpdI3WHlWfxSZDNUz1RaHOYMEqZMI2Gtyg6ZWP9kChsvRyt:ywwNtVuWHlWAZDKlSI2G4gsWKv0
Checks for missing Authenticode signature.
resource |
---|
4339608ad0a4ec2234a0693c38a8412e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
RaiseException
GetLocalTime
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetTickCount
ExitProcess
VirtualProtectEx
GetLastError
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
GetProcAddress
SetWindowsHookExA
CallNextHookEx
GetClassNameA
GetWindowThreadProcessId
RegOpenKeyExA
RegCloseKey
malloc
_adjust_fdiv
_strlwr
_strcmpi
_stricmp
_strupr
_initterm
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
strstr
??3@YAXPAX@Z
strncpy
strchr
free
HookProc
ddd
eee
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ