DllCanUnloadNow
DllGetClassObject
ShellExecuteObject_IShellExecuteHookA_Execute
Static task
static1
Behavioral task
behavioral1
Sample
bcc910395497cfe3ed8c7dab0c437965.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcc910395497cfe3ed8c7dab0c437965.dll
Resource
win10v2004-20240226-en
Target
bcc910395497cfe3ed8c7dab0c437965
Size
31KB
MD5
bcc910395497cfe3ed8c7dab0c437965
SHA1
01b23b793747d9b98d3a6b8719c32619de9a1b9f
SHA256
2cf41dc2fa0aef64ff5776f83c76fbc501b5fddbf3a06a6b226e390c8e642e3c
SHA512
c47010d1fe36a25fa27821904475237617b33643914e15c2e219849312f8a48df00946ad100b93caf4d6f9a6c07fa34470ff93f015a0ff7263be4de8cc9dad0e
SSDEEP
384:ATQH0vTFxdgAgz+dSC20A/HxGt8+6sB0x/ply3klhHtYp3h0MZeHyOz7hWbWnmns:f6TFxdgQwE8+Ixe32k5h0McT7Fmna6O
Checks for missing Authenticode signature.
resource |
---|
bcc910395497cfe3ed8c7dab0c437965 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memset
strcpy
strncpy
_strnicmp
strncmp
strlen
_strdup
free
memcpy
strcat
strcmp
HeapCreate
HeapDestroy
GetCurrentProcess
GetLastError
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
GetModuleFileNameA
GetSystemDirectoryA
Sleep
FindFirstFileA
FindClose
CreateFileA
SetFileTime
SetCurrentDirectoryA
SetFileAttributesA
DisableThreadLibraryCalls
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
HeapAlloc
HeapFree
FreeLibrary
LoadLibraryA
DeleteFileA
FindNextFileA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
MoveFileA
WriteFile
GetFileSize
SetFilePointer
ReadFile
WideCharToMultiByte
HeapReAlloc
closesocket
WSACleanup
WSAStartup
socket
inet_addr
gethostbyname
htons
connect
ioctlsocket
URLDownloadToFileA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
DeleteUrlCacheEntryA
OpenDesktopA
EnumDesktopWindows
CloseDesktop
GetClassNameA
FindWindowExA
PostMessageA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateProcessAsUserA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
DllCanUnloadNow
DllGetClassObject
ShellExecuteObject_IShellExecuteHookA_Execute
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ