set_create_window_hook
unset_create_window_hook
Static task
static1
Behavioral task
behavioral1
Sample
99eb8312363461d473fe6404ba0d37f7.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99eb8312363461d473fe6404ba0d37f7.dll
Resource
win10v2004-20231215-en
Target
99eb8312363461d473fe6404ba0d37f7
Size
44KB
MD5
99eb8312363461d473fe6404ba0d37f7
SHA1
885b80f7431058114767da0f3f41611603a60065
SHA256
77f41f4dbd52a57039a2b6511a03f7cb22991cb2df53c9f5eb8f741ba72c99b1
SHA512
6ba14e006443e44d83d1129651a4594a4d81bd5ab71bb687ec802071b36c14576509c5b792d900800e8ae5e277949740b53e9ea9b54fa2c6611002d2b3e87b43
SSDEEP
384:BoUwKKYkq+Ky7UYpDiRkZ+GVW6b8Qxz+N6J+faeA9ef9EGRc:BRRkq+KK/VW6QQxKwNfYc
Checks for missing Authenticode signature.
resource |
---|
99eb8312363461d473fe6404ba0d37f7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReleaseMutex
GetLastError
CreateMutexA
SetLastError
CloseHandle
WaitForSingleObject
CreateEventA
SetEvent
GetVolumeInformationA
GetTempPathA
GetSystemDirectoryA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowLongA
??2@YAPAXI@Z
__CxxFrameHandler
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
_CxxThrowException
??1exception@@UAE@XZ
memmove
strlen
memcpy
memset
sprintf
strchr
strncpy
free
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
_splitpath
set_create_window_hook
unset_create_window_hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE