DllServices
Inject
SqmAddToStreamAdd
hinstDLLin
Static task
static1
Behavioral task
behavioral1
Sample
314d6271f46bff8f61519eb1ece8c404717d4665460bab22df681a4840d3fd5c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
314d6271f46bff8f61519eb1ece8c404717d4665460bab22df681a4840d3fd5c.dll
Resource
win10v2004-20240226-en
Target
314d6271f46bff8f61519eb1ece8c404717d4665460bab22df681a4840d3fd5c
Size
136KB
MD5
fb1254871b2beccffc95cfcd8973d513
SHA1
ba22c60a11182eb16b376ab06444f2fcd298dc1e
SHA256
314d6271f46bff8f61519eb1ece8c404717d4665460bab22df681a4840d3fd5c
SHA512
edeac38230c8f18100359b8bedd7b42944acbdc643cb233857eb675ec29c85068d37b8bdb82502b4cb07482ba8e16a3f2daeccec7c2adc3429646277a6102e75
SSDEEP
3072:H3OlAF1X7X6OIyXLi9PnaKcRF0EEqcaFr7:e87Kqb+n16SEEqcm
Checks for missing Authenticode signature.
resource |
---|
314d6271f46bff8f61519eb1ece8c404717d4665460bab22df681a4840d3fd5c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetComputerNameA
WideCharToMultiByte
lstrcmpiA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
SetThreadContext
GetShortPathNameA
SetErrorMode
OpenEventA
SetUnhandledExceptionFilter
DeleteFileA
OutputDebugStringA
QueryDosDeviceA
GetLogicalDriveStringsA
GetCurrentThreadId
GetSystemInfo
lstrcpyA
GlobalSize
GlobalUnlock
GlobalAlloc
GlobalLock
GlobalFree
ProcessIdToSessionId
DeviceIoControl
GetProcessHeap
HeapAlloc
HeapFree
ReadProcessMemory
GetLocalTime
GetSystemDirectoryA
MultiByteToWideChar
OpenProcess
VirtualAllocEx
GetVersionExA
SetLastError
lstrcatA
WriteFile
ReadFile
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDriveTypeA
lstrlenA
CreateDirectoryA
GetLastError
SetFileAttributesA
CancelIo
InterlockedExchange
FreeLibrary
GetModuleHandleA
VirtualAlloc
Sleep
PeekNamedPipe
CreatePipe
CreateProcessA
GetTickCount
GetModuleFileNameA
GetTempPathA
GetTempFileNameA
LocalSize
CopyFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
GetProcAddress
ResumeThread
WaitForSingleObject
TerminateThread
CreateEventA
CloseHandle
GetThreadContext
mouse_event
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
LoadCursorA
SendMessageA
GetCursorInfo
GetCursorPos
SetRect
GetDC
GetDesktopWindow
SystemParametersInfoA
BlockInput
DestroyCursor
EnumWindows
GetKeyState
GetAsyncKeyState
GetForegroundWindow
MessageBoxA
wsprintfA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
CreateWindowExA
CloseWindow
IsWindow
ReleaseDC
CreateCompatibleBitmap
GetDIBits
CreateDIBSection
DeleteDC
DeleteObject
CreateCompatibleDC
BitBlt
SelectObject
RegOpenKeyA
CloseEventLog
RegQueryValueExA
OpenServiceA
QueryServiceStatus
ControlService
RegOpenKeyExA
RegCloseKey
RegQueryValueA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueA
CloseServiceHandle
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
SetServiceObjectSecurity
ConvertStringSecurityDescriptorToSecurityDescriptorW
QueryServiceObjectSecurity
OpenSCManagerA
ChangeServiceConfig2A
CreateServiceA
DeleteService
ClearEventLogA
SHGetFileInfoA
PathFileExistsA
calloc
_strupr
_strlwr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_mbsnbicmp
strstr
printf
realloc
_vsnprintf
_mbsicmp
_mbsnicmp
sprintf
wcscpy
strncpy
_except_handler3
malloc
free
_CxxThrowException
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
gethostbyname
htons
socket
WSAStartup
closesocket
ntohs
select
send
WSASocketA
setsockopt
sendto
gethostname
getsockname
inet_addr
connect
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
WTSEnumerateSessionsA
WTSQuerySessionInformationA
WTSFreeMemory
WTSQueryUserToken
capGetDriverDescriptionA
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
GetProcessImageFileNameA
DllServices
Inject
SqmAddToStreamAdd
hinstDLLin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ