DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
970d4c27eb6106316e6625bc00a08555.dll
Resource
win7-20231215-en
Target
970d4c27eb6106316e6625bc00a08555
Size
100KB
MD5
970d4c27eb6106316e6625bc00a08555
SHA1
dda2df05fa1fdfd7430f22a6838ea6847b42fa9d
SHA256
b5d8ca9ba02a495ab05d69d431e4689dcb9c560e96b513603fb1b1eec98aa35a
SHA512
a0f2ea0048873088598bdf5f9ed31851917caadc9b25f3cf7eecd01b340329f799f487ce1432c110e4f425314ee4806087ce6eb482a6078a0c4a24901670a2db
SSDEEP
768:x+euEzb+/pL7gYciRiZ6hXa15fwh1Q/MKuUCfipFGLsMO4WCSb26AVLksQqxzjfS:xfC/5bxRw6U5ffMKcfiG4t4AYyLq5xD
Checks for missing Authenticode signature.
resource |
---|
970d4c27eb6106316e6625bc00a08555 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
bind
listen
accept
send
select
recv
WSAStartup
gethostbyname
htons
connect
socket
closesocket
GetCurrentThreadId
MultiByteToWideChar
SetEvent
ReadFile
GetFileSize
CreateFileA
GetCurrentProcess
SetFileTime
WriteFile
MoveFileA
DeleteFileA
GetFileTime
Sleep
FindNextFileA
SetFilePointer
FindFirstFileA
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
QueryPerformanceCounter
SetEndOfFile
CreateEventA
OpenEventA
GetLastError
lstrlenW
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
lstrlenA
lstrcmpA
InterlockedIncrement
lstrcpyA
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
GetSystemDirectoryA
CloseHandle
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitThread
FreeLibrary
CreateThread
WideCharToMultiByte
GetTickCount
GetTempPathW
RaiseException
ResetEvent
WaitForSingleObject
GetModuleHandleA
lstrcatA
InterlockedDecrement
ExitWindowsEx
GetDC
ReleaseDC
FillRect
GetMessageA
TranslateMessage
DispatchMessageA
DrawTextA
wsprintfA
SetTimer
GetForegroundWindow
AttachThreadInput
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
GetCursorPos
ScreenToClient
RegisterWindowMessageA
SendMessageTimeoutA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
wsprintfW
EnumThreadWindows
IsWindowVisible
GetAncestor
GetSystemMetrics
SendMessageA
WindowFromPoint
GetClassNameA
DrawTextW
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
SetTextColor
SetBkColor
CreateCompatibleBitmap
BitBlt
SelectObject
DeleteObject
DeleteDC
GetUserNameA
RegQueryValueExA
RegEnumValueA
IsTextUnicode
RegEnumKeyExA
RegOpenKeyExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
ShellExecuteA
CoInitialize
CoUninitialize
CLSIDFromString
LoadRegTypeLi
SysStringLen
VariantCopy
VariantInit
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
ord23
ord58
ord30
ord32
ord57
ord18
ord15
ord16
ord21
ord31
free
atoi
wcscmp
rand
__CxxFrameHandler
sprintf
strstr
strncpy
strchr
wcslen
_strupr
isdigit
isalpha
??2@YAPAXI@Z
srand
strrchr
_purecall
_except_handler3
fclose
fread
fopen
fwrite
_EH_prolog
memcpy
strlen
strcpy
realloc
_mbsnbicmp
memmove
_mbsstr
_mbsnbcmp
_mbsicmp
fseek
_strnicmp
?terminate@@YAXXZ
malloc
strncat
??3@YAXPAX@Z
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_CxxThrowException
time
_strlwr
_itoa
ftell
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ