??0Copendll@@QAE@XZ
??4Copendll@@QAEAAV0@ABV0@@Z
?fnopendll@@YAHXZ
?nopendll@@3HA
Static task
static1
Behavioral task
behavioral1
Sample
55ef3a8c5443e40fe17a13eabf6260dc.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55ef3a8c5443e40fe17a13eabf6260dc.dll
Resource
win10v2004-20231215-en
Target
55ef3a8c5443e40fe17a13eabf6260dc
Size
18KB
MD5
55ef3a8c5443e40fe17a13eabf6260dc
SHA1
942765f22fc1934cb5620569bd17f5eeccc0e0df
SHA256
d48d56de204b79b4fa82dc57297e7b51717f8c2c2bd501ca8808a0b4c4b6c417
SHA512
b5a86eec6e5b757f67208946d283f7ab45d11e56b6e992a563649b234ca8a9dc1f84412667176a2c13599f81a4d3bb16ff4655113da479c6e6eefb34d7ac023c
SSDEEP
384:9qkQP2YUUpbCNE31nozqOCvQWwByYKSZ7n7posGJXzVJgfWwjGySH:9/4WNmoAVSZ7n7CJJfyq
Checks for missing Authenticode signature.
resource |
---|
55ef3a8c5443e40fe17a13eabf6260dc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
ExitProcess
GetProcAddress
Sleep
CreateRemoteThread
CreateFileA
GetVersionExA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
GetSystemDirectoryA
CopyFileA
SetFileAttributesA
GetModuleFileNameA
GetDriveTypeA
GetLogicalDriveStringsA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
CloseHandle
GetWindowsDirectoryA
FindFirstFileA
FindClose
DeviceIoControl
RegOpenKeyExA
RegCloseKey
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
sprintf
_itoa
_beginthread
__CxxFrameHandler
??3@YAXPAX@Z
strncat
strcpy
strlen
rand
srand
time
strcat
strncpy
memset
memcpy
printf
_mkdir
strchr
_ultoa
_except_handler3
difftime
atoi
rename
strcmp
Netbios
??0Copendll@@QAE@XZ
??4Copendll@@QAEAAV0@ABV0@@Z
?fnopendll@@YAHXZ
?nopendll@@3HA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ