DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Behavioral task
behavioral1
Sample
49ff388ea0d107c59ebdeba637e33885.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
49ff388ea0d107c59ebdeba637e33885.dll
Resource
win10v2004-20231215-en
Target
49ff388ea0d107c59ebdeba637e33885
Size
39KB
MD5
49ff388ea0d107c59ebdeba637e33885
SHA1
0f2cc5f08f17c53e870af96e6e3f2eddbb472ad3
SHA256
ea688697aef00bc575cc53c97f43f4e8baf50f21677a3d04273fa9501415622f
SHA512
a6dbae308feb547a5313da6b4bfec435a839092087167b5bd048209cae8cc5362139df7f87d34d63c0b6f814b2993502b8fee920b10d14dbfa8aaf8539bb1e2f
SSDEEP
384:VK7kt5KK/D2pF3lcZNIrU5wA9Exez2UKQ:Yw5KCDY9iBGxeaUKQ
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
49ff388ea0d107c59ebdeba637e33885 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
lstrcmpiA
WriteFile
SetFilePointer
SetFileAttributesA
SetEndOfFile
ReadFile
LoadLibraryA
GetTempPathA
GetSystemDirectoryA
GetModuleFileNameA
GetFileSize
GetDriveTypeA
FreeLibraryAndExitThread
DeleteFileA
CreateThread
CreateProcessA
CreateFileA
CopyFileA
CloseHandle
GetCurrentThreadId
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetSystemTime
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
SysFreeString
SysReAllocStringLen
PathFileExistsA
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
PostMessageA
KillTimer
IsWindow
IsCharAlphaA
GetMessageA
FindWindowA
DispatchMessageA
CreateWindowExA
CallNextHookEx
AnyPopup
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE