Add_DLL
ApiHookChain
ConServerDllInitialization
Static task
static1
Behavioral task
behavioral1
Sample
95bb825b826670d05073d4fac8b66fc4.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95bb825b826670d05073d4fac8b66fc4.dll
Resource
win10v2004-20231215-en
Target
95bb825b826670d05073d4fac8b66fc4
Size
46KB
MD5
95bb825b826670d05073d4fac8b66fc4
SHA1
13caa32f795ec599036c01bcdeed481d73084e66
SHA256
e34ac383f6dc5503004dd75b2a5c667d5d727456027cd83ca09a98f528cc71be
SHA512
dc5d6c36e49d02f384583208bb30063817152509f9fc83f79340fc192f5e94dc20d86c6ecebdbb770999642e27bf55a1f13815651275e0a5fd9181b1edfbd758
SSDEEP
768:FhJbHmRSTANX0/zOx/RpG1ybUP4CRWO78oUMwp:rxqSTANXgzgZpgyw0O4o2p
Checks for missing Authenticode signature.
resource |
---|
95bb825b826670d05073d4fac8b66fc4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegQueryValueExW
RegOpenKeyW
RegCloseKey
LeaveCriticalSection
EnterCriticalSection
Sleep
DisableThreadLibraryCalls
InitializeCriticalSection
GetCurrentProcessId
CloseHandle
CreateThread
GetVersion
CreateRemoteThread
GetModuleHandleA
WaitForSingleObject
OpenProcess
DuplicateHandle
VirtualAlloc
VirtualFree
ReadProcessMemory
WideCharToMultiByte
WriteProcessMemory
VirtualQuery
ResumeThread
GetExitCodeThread
SuspendThread
TerminateThread
GetThreadContext
SetThreadContext
GetProcAddress
LCMapStringW
lstrcmpiW
lstrcmpiA
MultiByteToWideChar
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
WriteFile
SetFilePointer
InterlockedDecrement
InterlockedIncrement
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
LoadLibraryA
SetStdHandle
LCMapStringA
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
Add_DLL
ApiHookChain
ConServerDllInitialization
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ