DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
7faa2402b61cbb3d9b83f32de349a249.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7faa2402b61cbb3d9b83f32de349a249.dll
Resource
win10v2004-20231215-en
Target
7faa2402b61cbb3d9b83f32de349a249
Size
56KB
MD5
7faa2402b61cbb3d9b83f32de349a249
SHA1
1b0dd5c5588b6c8e360ff8d1431843425f3e5618
SHA256
d387151ba08c94d54c4b2cc652bba029b92a05ff5fd1eb06e614073a12948f72
SHA512
7887398f8f5e650ea8cee7ce1d175002065ab035c113da3e3d637e184e560353ec9c0f7a9741349d97bda3d080f03e238d09ecf444816fd15c875f1dfc392e1c
SSDEEP
1536:0EpA4uwzRfld2qgwLIPCvxg/BqZ2Nj5fMpNIYf:0EhRzZlFzLIava/M2bfMvf
Checks for missing Authenticode signature.
resource |
---|
7faa2402b61cbb3d9b83f32de349a249 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
GetKeyboardType
RegQueryValueExA
SysFreeString
GetPixel
WSACleanup
InternetReadFile
ShellExecuteA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE