CreateMainProc
CreateProtectProc
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SetVM
SysLogoff
SysLogon
Static task
static1
Behavioral task
behavioral1
Sample
4fe4455179768778304bc23b73ea837f.dll
Resource
win7-20231215-en
Target
4fe4455179768778304bc23b73ea837f
Size
568KB
MD5
4fe4455179768778304bc23b73ea837f
SHA1
d6ff53c022a7c5df2522aeca2f43a34a0f995258
SHA256
cab28c6be445ab532af97a46acc8dcce2e9d0a6f4ee77c7e1a2853324d63ce51
SHA512
7bc04921fab001998298d0b7c73463fac73fe3bcd3874c3d738118ed781ef4b85c92f716fe1e6fbba3032661193cc064dd2178d4f8ba4a71b0c1527152b52ba8
SSDEEP
12288:TshUNBT25yMkB+KXBv4qIpuSL+mw6QcmjC21oB:T3Ns0lEKXBv/q+xjLqB
Checks for missing Authenticode signature.
resource |
---|
4fe4455179768778304bc23b73ea837f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetFolderPathA
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetQueryOptionA
InternetCrackUrlA
InternetReadFile
InternetGetConnectedState
InternetCanonicalizeUrlA
InternetOpenA
InternetGetCookieA
InternetSetCookieA
HttpAddRequestHeadersA
WSACleanup
gethostbyaddr
WSAStartup
SetStdHandle
GetStartupInfoA
GetFileType
GetVolumeInformationA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
lstrlenA
lstrcmpiA
lstrcpyA
GetModuleHandleA
GetModuleFileNameA
CompareStringA
CompareStringW
lstrcpynA
IsDBCSLeadByte
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
CloseHandle
SetEvent
CreateEventA
ReadFile
SetFilePointer
CreateFileA
VirtualFree
VirtualAlloc
GetFileSize
SetFileAttributesA
WriteFile
FreeLibrary
GetProcAddress
LoadLibraryA
ReleaseMutex
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
MoveFileA
DeleteFileA
OpenEventA
VirtualProtect
FlushInstructionCache
GetCurrentProcess
SetLastError
Sleep
GetCurrentThreadId
LocalFree
LocalAlloc
FormatMessageA
CreateMutexA
GlobalAlloc
InterlockedCompareExchange
SetWaitableTimer
CreateWaitableTimerA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileTime
lstrcatA
OpenMutexA
ExitProcess
GetStringTypeA
TerminateThread
GetExitCodeThread
CreateThread
SystemTimeToFileTime
GetLocalTime
CopyFileA
GetCurrentProcessId
SetErrorMode
SetUnhandledExceptionFilter
SetEndOfFile
GetWindowsDirectoryA
Process32Next
TerminateProcess
GetStringTypeW
Process32First
CreateToolhelp32Snapshot
OpenSemaphoreA
CreateDirectoryA
FindCloseChangeNotification
FindClose
CompareFileTime
FindNextFileA
FindFirstFileA
GetFileAttributesA
CreateProcessA
GetTempPathA
GetShortPathNameA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenFileMappingA
FlushFileBuffers
ExitThread
CancelWaitableTimer
OpenWaitableTimerA
GetTickCount
IsBadReadPtr
GetDiskFreeSpaceExA
SetCurrentDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemTime
ExpandEnvironmentStringsA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
GetSystemDirectoryA
GetStdHandle
FreeEnvironmentStringsA
SetHandleCount
QueryPerformanceCounter
GetOEMCP
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
IsBadWritePtr
HeapCreate
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
RtlUnwind
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
FreeLibraryAndExitThread
OpenProcess
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageA
CreateWindowExA
GetMessageA
DispatchMessageA
GetParent
GetPropA
SetPropA
CallWindowProcA
DefWindowProcA
FindWindowExA
wsprintfA
GetSystemMetrics
GetKeyboardLayout
PostMessageA
SetWindowPos
RemovePropA
GetWindowThreadProcessId
AttachThreadInput
GetActiveWindow
GetFocus
SetActiveWindow
GetForegroundWindow
GetKeyboardLayoutList
GetDlgItem
ActivateKeyboardLayout
GetKeyboardLayoutNameA
LoadStringA
wvsprintfA
CharNextA
RegOpenKeyA
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegFlushKey
SetNamedSecurityInfoA
SetEntriesInAclA
SetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoInitializeEx
StringFromGUID2
CoSetProxyBlanket
CoTaskMemFree
CoGetInterfaceAndReleaseStream
CreateStreamOnHGlobal
CoMarshalInterface
CoUnmarshalInterface
CoCreateInstance
OleRun
StringFromCLSID
CoMarshalInterThreadInterfaceInStream
SysStringByteLen
VariantCopy
UnRegisterTypeLi
RegisterTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
GetErrorInfo
VarUI4FromStr
SysAllocStringByteLen
LoadTypeLi
SysStringLen
SysAllocString
VariantInit
VariantClear
SysFreeString
StrStrIA
StrCmpNIA
SHDeleteValueA
StrRChrA
StrChrA
UrlEscapeA
PathFileExistsA
PathFindExtensionA
CreateMainProc
CreateProtectProc
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SetVM
SysLogoff
SysLogon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE