HookProc
RunUI
Static task
static1
Behavioral task
behavioral1
Sample
c4e3af37e799eb6687f07e5b64200458.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e3af37e799eb6687f07e5b64200458.dll
Resource
win10v2004-20240226-en
Target
c4e3af37e799eb6687f07e5b64200458
Size
112KB
MD5
c4e3af37e799eb6687f07e5b64200458
SHA1
b1e4efc500e856e9e79b858958d905d254ee1bd9
SHA256
73e615f6c6a1520e241e9e16ea6327cb65d077c1c42516f2455a1c8c9c389ab6
SHA512
989addd601e0fb532c63d98de610373d94e977de31667bd71d8a71d5469331c282313855053d17ff398b176d8c6f2eec99a14be2455c710413fed89e52832edc
SSDEEP
1536:Iv5eiBpVv1T8StH0oB23ouOm90mYoZSm5dLOBDriu23vz:IvfR/tH0J0mYo9MBDmu2
Checks for missing Authenticode signature.
resource |
---|
c4e3af37e799eb6687f07e5b64200458 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
SHSetValueA
SHGetValueA
HeapDestroy
CloseHandle
WriteFile
SizeofResource
CreateFileA
LockResource
LoadResource
FindResourceA
Sleep
CreateThread
GetModuleFileNameA
DeleteFileA
MoveFileExA
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempPathA
GetCurrentProcessId
GetTickCount
OpenProcess
lstrlenW
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
RaiseException
LCMapStringW
LCMapStringA
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineA
GetVersion
WriteConsoleA
HeapCreate
VirtualFree
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetModuleHandleA
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapSize
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
TranslateMessage
EnumWindows
UnhookWindowsHookEx
GetWindowThreadProcessId
PostThreadMessageA
DispatchMessageA
GetMessageA
CallNextHookEx
SetWindowsHookExA
CoCreateInstance
LoadRegTypeLi
SysStringLen
DispCallFunc
VariantClear
SysFreeString
HookProc
RunUI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE