DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
76c6cd5dbe84ebf8d123d54dd8b0a912.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
76c6cd5dbe84ebf8d123d54dd8b0a912.dll
Resource
win10v2004-20231215-en
Target
76c6cd5dbe84ebf8d123d54dd8b0a912
Size
48KB
MD5
76c6cd5dbe84ebf8d123d54dd8b0a912
SHA1
5fe154633cfae22be511208e52deb4e32ed3a224
SHA256
7b9ac99d48dda2b24bce061e5ed23289c4abc97ee9cd49e85980337a071f1d4b
SHA512
a45f6e0f554613f39ede2d40b2328400a77de8d5004a470cd816e1ef333bc523f01ae3eb83e730977c538abf141fca18c89d73350e9291bf3befd1354fa553d8
SSDEEP
768:0KB3IuUm9xnRQW3xT3IUHqgAPZyZeVX6d5EfrpMxhXXg:DB3IG9xRd3VIQG4C6djhXXg
Checks for missing Authenticode signature.
resource |
---|
76c6cd5dbe84ebf8d123d54dd8b0a912 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetLastError
GetLocalTime
GetCurrentProcessId
WritePrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
DeleteFileA
Process32Next
lstrlenW
InterlockedIncrement
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateEventA
WideCharToMultiByte
CreateThread
Sleep
GetProcAddress
GetModuleFileNameA
LoadLibraryA
CloseHandle
Process32First
GetCommandLineW
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
IsWindow
PostMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strchr
_strlwr
fopen
fwrite
fclose
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
strcat
_access
memset
strcpy
strstr
strcmp
strrchr
??3@YAXPAX@Z
sprintf
rand
memcpy
strlen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ