Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
5004690562ade9b3bcdafa783fd3630a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5004690562ade9b3bcdafa783fd3630a.dll
Resource
win10v2004-20231215-en
Target
5004690562ade9b3bcdafa783fd3630a
Size
13KB
MD5
5004690562ade9b3bcdafa783fd3630a
SHA1
757d84cd2578821437f9da7a1a06e5a661f604b0
SHA256
77f6d525a53891f2eaad8551d2088b9a56f9b1a3d9c89c07eee4df14220bb05e
SHA512
a9531233e40457707bc1dbd5d12c2df006835ad95a7f770f53fafba3f6c2ebc1c0bcc75f8f666e5b21e2e71ba7a06776476aadee23e8542428ed2e4a11ea03f6
SSDEEP
192:nWBJvbCodKTfl0fnH2p7I24XopU4bWt9Z+dL+J3HtXoa2d:WbWxT+up7IxYiD+du5a
Checks for missing Authenticode signature.
resource |
---|
5004690562ade9b3bcdafa783fd3630a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
VirtualProtect
Sleep
lstrcmpA
lstrcatA
lstrcmpiA
lstrcpyA
ExitProcess
lstrlenA
GetTickCount
lstrcpynA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WritePrivateProfileStringA
GetTempPathA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ