DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4cccfcbe6b2f2025e25591d4215b6e4b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cccfcbe6b2f2025e25591d4215b6e4b.dll
Resource
win10v2004-20231215-en
Target
4cccfcbe6b2f2025e25591d4215b6e4b
Size
48KB
MD5
4cccfcbe6b2f2025e25591d4215b6e4b
SHA1
fba4cd4fe3730f61e6f271de97ce69c20c89eb42
SHA256
9d70d5a9dea2555f49198ca432cfc726158bf6132105f6c11cbd8f60397b6893
SHA512
b9864c38ceaf7d755af58b31844f79fbb143adb6dd7f05d4a797c6c398b8940fb5fdcebbaa9137b3d17e724067a366b83d16b60c3710b9a6c699ac0259c9059d
SSDEEP
768:rDQ3ZAZ1K128i8Zkk5sFZVb0navKNEs3tdls5FDx6vCxEfhYURf:vOCrIP9szVbauKiwtdlM4GEffR
Checks for missing Authenticode signature.
resource |
---|
4cccfcbe6b2f2025e25591d4215b6e4b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
CloseHandle
Process32Next
Process32First
InterlockedDecrement
GetLastError
WritePrivateProfileStringA
CreateEventA
GetCurrentProcessId
DeleteFileA
GetLocalTime
GetCommandLineW
Sleep
CreateThread
WideCharToMultiByte
GetWindowsDirectoryA
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetProcAddress
ShowWindow
RegisterClassExA
CallNextHookEx
SetTimer
KillTimer
SendMessageA
IsWindow
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
PostMessageA
DefWindowProcA
CreateWindowExA
SetWindowTextA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strstr
_access
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strrchr
strcpy
strcat
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
memset
sprintf
rand
memcpy
strlen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ