AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
Static task
static1
Behavioral task
behavioral1
Sample
96550b3e5a1d9c2070c598d2a821b6be.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96550b3e5a1d9c2070c598d2a821b6be.dll
Resource
win10v2004-20231215-en
Target
96550b3e5a1d9c2070c598d2a821b6be
Size
9KB
MD5
96550b3e5a1d9c2070c598d2a821b6be
SHA1
dd4bf6cb9749dc7061406a8e9a15995113ff6106
SHA256
ecafb2deeb2ee556249508ac18cf9b8c3101a154613fb4397a336cb49b3895d3
SHA512
a2dd884f089daeea80c6e8f1a36e11c83e63b238812696b4504eb045d070c2d126381e13d04aa4e2250c9a96e7807da9c9eb447dfbfdd085bde49ca56e0b857c
SSDEEP
192:R0QFNqsrIGPWxfLp3jafWQgXCEPwHJTOXWxcKBCRGeH9DDyB:R0QFssrBPWxfLpTafcC1KNfGek
Checks for missing Authenticode signature.
resource |
---|
96550b3e5a1d9c2070c598d2a821b6be |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateDirectoryW
CreateFileA
CreateProcessA
CreateThread
ExitProcess
FreeLibraryAndExitThread
GetCommandLineA
GetModuleFileNameA
GetProcAddress
GetShortPathNameA
LoadLibraryA
OpenEventA
RtlZeroMemory
Sleep
TerminateThread
VirtualAlloc
VirtualProtect
WaitForSingleObject
WinExec
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
lstrlenW
CallWindowProcA
CreateDialogParamW
FindWindowW
SetWindowLongA
SetWindowTextW
ShowWindow
wsprintfA
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
WSASocketA
closesocket
connect
gethostbyname
ioctlsocket
ntohs
recv
select
send
setsockopt
socket
InternetConnectA
WinVerifyTrust
ShellExecuteA
StrRChrA
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
AddProcessExclusion
GetChangeRect
GetChangedWindowList
IsTitleBarButtonPressed
RemoveProcessExclusion
SetButtonXOffset
SetSingleWindow
ShowTitleBarButton
StartHooks
StopHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE