JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
506ac386404c39f42edbed62d24f15bf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
506ac386404c39f42edbed62d24f15bf.dll
Resource
win10v2004-20231215-en
Target
506ac386404c39f42edbed62d24f15bf
Size
24KB
MD5
506ac386404c39f42edbed62d24f15bf
SHA1
ad8f3cbc172e19fc68896b3b9882d65629fa1794
SHA256
cbaec7403622c9a63c14938680adf6fa77b7ce174240251a1dfaaaf6ef29b5a1
SHA512
742641ab44a3a07fa324bf96124c8fa1d481114d49f15b9bce93134eec726c2c2d1ac9e0eaee155fc4d333483b5c04beb444983f265885f1aa4c91c78e19cf70
SSDEEP
192:z0Xbx+DF877BA5y/PAc92eUswvV9EgzMAajTCaaU1hziYm4E/3a8e:oLIDF879ayrceUsiV9QAYdaHy8e
Checks for missing Authenticode signature.
resource |
---|
506ac386404c39f42edbed62d24f15bf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
CreateEventA
GlobalLock
GlobalAlloc
GetModuleHandleA
Sleep
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileA
VirtualProtectEx
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
VirtualProtect
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
fread
memcpy
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ