DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
iedisco
Behavioral task
behavioral1
Sample
b512c2d840776b0b4ddfb7af74a9feee.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b512c2d840776b0b4ddfb7af74a9feee.dll
Resource
win10v2004-20240226-en
Target
b512c2d840776b0b4ddfb7af74a9feee
Size
304KB
MD5
b512c2d840776b0b4ddfb7af74a9feee
SHA1
dc44080685bc4325f791a6271dcb8eeb66fc984e
SHA256
bddd86f9729b0da534e09bc8808049bf36202bf3b6285cfa5e6e06fea7f54d52
SHA512
09df7848e595a862bca42664609de0ac33b735bbb6b18d01a27e123db01253c617647e11ff2e79f7826d08ff587d3fd1d11b9a04244d317aab4f1753c4d0b2ea
SSDEEP
3072:/BBbGCXNyy44NPDIgXGBDYl2WmupqKrQNHlJel:/mCky44pGBAhAKrQNHLel
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
b512c2d840776b0b4ddfb7af74a9feee |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
InterlockedDecrement
lstrlenA
WideCharToMultiByte
LocalFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedIncrement
lstrcatA
lstrcpynA
OutputDebugStringA
GetShortPathNameA
GetModuleHandleA
lstrlenW
GetModuleFileNameA
lstrcmpiA
CloseHandle
EnterCriticalSection
GetSystemInfo
GetLastError
CreateFileA
WriteFile
TerminateProcess
OpenProcess
ExitProcess
DisableThreadLibraryCalls
HeapAlloc
GetVersionExA
HeapCreate
HeapDestroy
TerminateThread
CreateThread
Sleep
GetTickCount
lstrcmpA
CreateProcessA
GetWindowsDirectoryA
OutputDebugStringW
DeleteFileA
FindNextFileA
FindFirstFileA
GetSystemDirectoryA
WaitForSingleObject
CreateDirectoryA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
LocalAlloc
GlobalFree
GlobalAlloc
FindResourceA
LockResource
SizeofResource
LoadResource
ReadFile
GetFileSize
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
SetBkColor
GetStockObject
GetDIBits
GetObjectA
SetMapMode
SetTextColor
CreateSolidBrush
SetBkMode
CreateFontA
DeleteObject
SetWindowExtEx
SetViewportExtEx
_ftol
??1type_info@@UAE@XZ
realloc
strchr
free
fopen
fwrite
strrchr
abs
strncmp
fclose
strncpy
srand
atol
time
localtime
rand
strstr
_mbscmp
atof
atoi
memcmp
_mbsnbcmp
sprintf
pow
_ismbcdigit
_adjust_fdiv
_mbclen
vsprintf
strlen
_mbsrchr
memmove
_mbsinc
_mbsstr
_mbslwr
memset
_mbschr
memcpy
??3@YAXPAX@Z
wcslen
strcpy
malloc
??2@YAPAXI@Z
_CxxThrowException
__dllonexit
_onexit
_initterm
_msize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoInitialize
CoUninitialize
StringFromCLSID
CoTaskMemFree
ShellExecuteA
Shell_NotifyIconA
URLOpenBlockingStreamA
InsertMenuA
DestroyMenu
SetDlgItemTextA
TrackPopupMenu
LoadStringA
GetWindowThreadProcessId
SendMessageA
CreatePopupMenu
GetWindowPlacement
GetCursorPos
InvalidateRect
GetParent
SetForegroundWindow
DestroyWindow
LoadImageA
IsWindow
GetClipboardData
CreateWindowExA
OpenClipboard
GetDC
CloseClipboard
GetOpenClipboardWindow
TranslateMessage
CopyIcon
PeekMessageA
SetSystemCursor
DispatchMessageA
GetDlgItem
CopyImage
CharUpperBuffA
LoadCursorA
GetSystemMetrics
CharLowerBuffA
GetForegroundWindow
EnumWindows
GetClientRect
FillRect
GetClassNameA
SetWindowsHookExA
UnhookWindowsHookEx
PostMessageA
GetWindowTextA
CallNextHookEx
SetWindowPos
GetWindowRect
GetDesktopWindow
SetWindowLongA
MoveWindow
GetWindowLongA
MessageBoxA
ShowWindow
EnableWindow
SetTimer
SetWindowTextA
EndDialog
FindWindowA
DialogBoxParamA
KillTimer
GetDlgItemTextA
CloseWindow
InternetGetConnectedState
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
iedisco
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE