DllInit
P01
P02
P03
P04
P05
P06
P07
P08
P09
P10
P11
P12
P13
P14
P15
Behavioral task
behavioral1
Sample
a1a43e9e15b990f159e2dc0d119ae889.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1a43e9e15b990f159e2dc0d119ae889.dll
Resource
win10v2004-20240221-en
Target
a1a43e9e15b990f159e2dc0d119ae889
Size
84KB
MD5
a1a43e9e15b990f159e2dc0d119ae889
SHA1
60989c1a621b9744aa0ffc5eb74ce0c5db590985
SHA256
5614f5b4d7dbf68d7973725cba5de8bac0f78bbddda0240b0bb078ed5ee8842c
SHA512
0932bdda3a3fad4ffe90855d7444d78e9c887e60f597adf4da756cedb5cb42117188b3d40b92c6177fc196525dcdea2de513a8e452fa9c32c90db55f6302269b
SSDEEP
1536:yrbf1673TclPUFhVYo3zQINA9l69EglyW4HjuFTPrmqtIlGJYZgH+bXHhzem:yPY73TaPUFhVYMTNnMbH8TCbZgHUXBzF
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
a1a43e9e15b990f159e2dc0d119ae889 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
lstrcpyA
HeapAlloc
WideCharToMultiByte
lstrlenW
SetLastError
lstrcmpiA
GetModuleHandleA
MultiByteToWideChar
CopyFileA
CreateEventA
GetCurrentProcessId
CloseHandle
lstrcmpA
HeapDestroy
CreateFileA
GetLastError
CreateDirectoryA
lstrcatA
GetTempPathA
lstrlenA
GetModuleFileNameA
HeapCreate
CompareFileTime
GetProcessTimes
GetCurrentProcess
GetFileTime
TerminateProcess
GetTickCount
LoadLibraryA
WriteProcessMemory
ReadProcessMemory
OpenEventA
ExitThread
SetEvent
WaitForSingleObject
WaitForMultipleObjects
CreateThread
ReadFile
VirtualProtect
IsBadWritePtr
CharLowerA
wsprintfA
MessageBoxA
DefWindowProcA
GetWindowLongA
SetWindowLongA
UnregisterClassA
DestroyWindow
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassExA
PostMessageA
KillTimer
SetTimer
DllInit
P01
P02
P03
P04
P05
P06
P07
P08
P09
P10
P11
P12
P13
P14
P15
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ