CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
Static task
static1
Behavioral task
behavioral1
Sample
7a382b27df4eebcc29a30d7e3030cd40.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a382b27df4eebcc29a30d7e3030cd40.dll
Resource
win10v2004-20231215-en
Target
7a382b27df4eebcc29a30d7e3030cd40
Size
304KB
MD5
7a382b27df4eebcc29a30d7e3030cd40
SHA1
f160e0211db6a3da25bff34f7794824217ca8f49
SHA256
bb7f0ffeec9994377f8cc9d7fdc630ae06641e298f4f67193499378759db23be
SHA512
7da416f9084a410624d3eb0eff754cefac092380b4318a71b9b745d3728be013db7376d671507047196ed5972547a3a289555f6baf21f73b4e3a596b44bda77e
SSDEEP
6144:G/0V06Qp/oIi/HA5rTqj2vX2ndkmrEcwXQM1dQ5QyC/Nv4:GZ6QZH7LgMNygv4
Checks for missing Authenticode signature.
resource |
---|
7a382b27df4eebcc29a30d7e3030cd40 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHFileOperationA
SHChangeNotify
SHCreateProcessAsUserW
UuidCreate
CoTaskMemFree
CoTaskMemAlloc
GetTimestampForLoadedLibrary
ImagehlpApiVersion
FindExecutableImageEx
FindExecutableImage
ImageRvaToSection
ImageNtHeader
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CloseDesktop
CloseClipboard
CloseWindow
CharNextA
CloseWindowStation
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
CharPrevA
DeleteFileW
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
DeleteCriticalSection
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
CreateSemaphoreA
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateMutexA
CreateFileW
CreateDirectoryW
HeapDestroy
CloseHandle
GetSystemDefaultLCID
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
GetTraceEnableLevel
GetTokenInformation
GetSecurityDescriptorDacl
CopySid
StrChrA
PathFileExistsA
StrCmpNA
ChrCmpIA
DeleteObject
DeleteDC
CreateSolidBrush
GetDeviceCaps
CreateDCA
ord9
CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ