A
B
C
D
E
Static task
static1
Behavioral task
behavioral1
Sample
6717d534a44c9913fffe9985ee7e933f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6717d534a44c9913fffe9985ee7e933f.dll
Resource
win10v2004-20231215-en
Target
6717d534a44c9913fffe9985ee7e933f
Size
27KB
MD5
6717d534a44c9913fffe9985ee7e933f
SHA1
ddcd79b2defbdd435d09451c1d494d1b73d93a38
SHA256
b84b9e7d76fc812ac0a24ee8dc88d6b88deacea6dddc513cb549632e7c5e04ce
SHA512
51c86a5d9d2b298d049eaed039d56b9df4cbfd4e6bbdb12a470ea6c56f4df627c14c049e69d0c0c2f27d3cb593898c6e4f44996711879c290a596ae3d15fdacc
SSDEEP
768:KEGyM1GwWCdkl8Ujp/HJ8UHQeUvr8coFJTDl7YJq2LvBmX:BGhtWZl8Ujp/HJ8UHQeyeLTR7YJzmX
Checks for missing Authenticode signature.
resource |
---|
6717d534a44c9913fffe9985ee7e933f |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
StrStrA
StrRChrA
StrStrIA
StrCmpNIW
StrCmpNA
URLDownloadToFileA
RegDeleteValueA
RegCreateKeyExA
RegFlushKey
RegNotifyChangeKeyValue
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
GetUserNameA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
SetFileTime
WaitForMultipleObjects
GetSystemTimeAsFileTime
DosDateTimeToFileTime
CreateProcessA
MultiByteToWideChar
CopyFileA
FileTimeToSystemTime
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTempPathA
OpenMutexA
lstrcpyA
lstrcatA
GetFileTime
GetCurrentProcessId
lstrcmpW
WideCharToMultiByte
Sleep
VirtualFree
VirtualAlloc
VirtualProtect
VirtualQuery
GetLastError
SetLastError
CloseHandle
FlushFileBuffers
WriteFile
lstrlenA
SetFilePointer
CreateFileA
lstrcmpiA
GetTickCount
GetVersion
GetModuleFileNameA
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
ExitProcess
SetEvent
OpenEventA
ResetEvent
ReleaseMutex
WaitForSingleObject
OpenProcess
CreateEventA
CreateMutexA
TerminateThread
FreeLibraryAndExitThread
CreateThread
GetComputerNameA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
ProcessIdToSessionId
CallNextHookEx
SetWindowsHookExA
GetMessageA
PostThreadMessageA
RegisterWindowMessageA
MsgWaitForMultipleObjects
PeekMessageA
wsprintfW
wsprintfA
DispatchMessageA
TranslateMessage
CreateWindowExA
UnhookWindowsHookEx
ord680
CoUninitialize
CoCreateInstance
CoInitializeEx
SysStringLen
SysAllocString
SysFreeString
A
B
C
D
E
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ