sethook
unhook
Static task
static1
Behavioral task
behavioral1
Sample
8028fa135114abc358b709604c8a438a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8028fa135114abc358b709604c8a438a.dll
Resource
win10v2004-20231215-en
Target
8028fa135114abc358b709604c8a438a
Size
24KB
MD5
8028fa135114abc358b709604c8a438a
SHA1
61f71e446b4657a8c99810836f1a23ca0d7a32ff
SHA256
c75d8a6d940dc3f5724b6791cfd73695adadee02f1e77f58a48379b2fce444f9
SHA512
5ff74328624798ab396163171716ab9c83280679825473f43c38d07ca771f95d127e187d3eba8c66630b793f0e700da1ded9578979a165fc9d2f24bc10d08a6b
SSDEEP
96:CsI0akI1JxFtz0TX7yUsJ2JdIxaEXuR0cmsZE:CsrakI1JtwHSJ2JixauS
Checks for missing Authenticode signature.
resource |
---|
8028fa135114abc358b709604c8a438a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord1176
ord1575
ord1168
ord1577
ord1182
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord537
ord2818
ord2614
ord800
ord342
ord540
ord1578
ord600
ord1116
ord826
ord269
??1type_info@@UAE@XZ
__CxxFrameHandler
??2@YAPAXI@Z
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
??3@YAXPAX@Z
_mbscmp
LocalFree
lstrcpyA
OpenProcess
GetModuleHandleA
LocalAlloc
GetWindowThreadProcessId
EnumChildWindows
FindWindowA
SetWindowsHookExA
SetWindowTextA
GetWindowTextA
GetClassNameA
GetWindow
UnhookWindowsHookEx
CallNextHookEx
FindWindowExA
sethook
unhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ