HookProc
InstallHook
RemoveHook
Static task
static1
Behavioral task
behavioral1
Sample
bb080270f6914c7ba05f7fcdcfcce23a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb080270f6914c7ba05f7fcdcfcce23a.dll
Resource
win10v2004-20240226-en
Target
bb080270f6914c7ba05f7fcdcfcce23a
Size
36KB
MD5
bb080270f6914c7ba05f7fcdcfcce23a
SHA1
4db454a7ce67f9e63528f0b11c2cfb09a7018035
SHA256
43b739680d2d41ecb3fb258a3bab8152d350b76a6ee807d48def89525806718a
SHA512
231447e40e17b51ef477eb74408ea59f4a262941bb07b788517659aebc67221943839e701944f55a2bb172dec1bf063b427c23ace99133295e7ac8926b73aec3
SSDEEP
384:nqqS78pWkPT5NGqu1mlWVtCj7y6bWHBIgNoUo3rM0ua:nqNmvT5JOCj7lWHBriUoI
Checks for missing Authenticode signature.
resource |
---|
bb080270f6914c7ba05f7fcdcfcce23a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadWritePtr
OutputDebugStringA
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
DisableThreadLibraryCalls
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
RtlUnwind
GetCommandLineA
GetVersion
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeW
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
UnhookWindowsHookEx
HookProc
InstallHook
RemoveHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ