Run
Rundll32
Static task
static1
Behavioral task
behavioral1
Sample
b55769a809e54d5c97782eaec74489c8.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b55769a809e54d5c97782eaec74489c8.dll
Resource
win10v2004-20240226-en
Target
b55769a809e54d5c97782eaec74489c8
Size
24KB
MD5
b55769a809e54d5c97782eaec74489c8
SHA1
cdc7405a58e47e78be7f1d49a31e627658979e2c
SHA256
d5901dfbddeb6c2c8db685762fb85770afa9a62b16b5b8d18969ec581fab0b65
SHA512
0df1852cd4d8939ec245039140f13416f30b53bdf354716d4e88310e8e6319139db392f5f15201c8abf72df5bcb46cd6da0b56e19f968a8e510c39252679d51e
SSDEEP
96:sKL4Q4afJZjlI+0XHAZmsgsQsnLLOr4PMyG4cOffTEUVoy4+AZYUu:H00J5lIOxdFG6TEUVoiACUu
Checks for missing Authenticode signature.
resource |
---|
b55769a809e54d5c97782eaec74489c8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
SetFileAttributesA
GetSystemDirectoryA
Sleep
IsBadStringPtrA
DisableThreadLibraryCalls
LoadLibraryA
InterlockedIncrement
FreeLibrary
GetModuleFileNameA
CloseHandle
CreateProcessA
PostMessageA
FindWindowExA
DefWindowProcA
SetTimer
DispatchMessageA
wsprintfA
SetWindowsHookExA
TranslateMessage
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
CallNextHookEx
CoInitialize
CoUninitialize
CoCreateGuid
PathFileExistsA
SHGetValueA
SHSetValueA
URLDownloadToFileA
time
_adjust_fdiv
malloc
_initterm
free
_except_handler3
strrchr
_stricmp
_beginthreadex
sprintf
Run
Rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ