DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetVer
Install
Static task
static1
Behavioral task
behavioral1
Sample
6476ac98718d1e7750a29fddbc943383.dll
Resource
win7-20231215-en
Target
6476ac98718d1e7750a29fddbc943383
Size
60KB
MD5
6476ac98718d1e7750a29fddbc943383
SHA1
a3d1dd98da5511e8100d0ceea896a30a004e82b8
SHA256
bac2fa9456c83c1a8476e7f3da7d0f3f383160a71e6149b219b263b313121d4c
SHA512
d0719294781bf04dc06a55d2c98fe71af289926af2a18c6214de4dfc9a07d2e91c1afdc6de9fc933776f5bd0398fe03a358f9eb4e2dcdf57f780d71bd9372ab1
SSDEEP
768:6J8garVWtigatRnZAfM+5KkBiblaPRBZK0QLWxvCleQK9OENRDsNn/lT:W/aC9afkKFCK0QgvFrJNRS/lT
Checks for missing Authenticode signature.
resource |
---|
6476ac98718d1e7750a29fddbc943383 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetShortPathNameW
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
InitializeCriticalSection
GetLastError
LoadLibraryExW
lstrcmpiW
lstrcpynW
HeapDestroy
LoadLibraryW
lstrcpyW
lstrcatW
DeleteFileA
WinExec
GetBinaryTypeA
GetTickCount
GetTempPathA
WideCharToMultiByte
GetLocalTime
DisableThreadLibraryCalls
GetModuleHandleA
GetModuleFileNameA
Sleep
CreateThread
OpenProcess
VirtualProtectEx
WriteProcessMemory
GetProcAddress
GetCurrentProcess
FindResourceW
CloseHandle
GetMessageW
UnhookWindowsHookEx
CharLowerA
SetWindowsHookExW
CharNextW
CallNextHookEx
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
ShellExecuteA
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
SysFreeString
VariantClear
VarUI4FromStr
SysAllocString
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
socket
htons
connect
recv
gethostbyname
inet_addr
closesocket
WSAStartup
send
_stricmp
_adjust_fdiv
_initterm
wcscmp
calloc
wcslen
swprintf
_access
rename
strncmp
strchr
memcmp
realloc
malloc
free
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
atoi
strcat
strcmp
_splitpath
fgets
strstr
sprintf
memcpy
memset
fopen
strlen
strcpy
fclose
fwrite
Netbios
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetVer
Install
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ