DllCanUnloadNow
DllGetClassObject
a
f
h
o
s
Static task
static1
Behavioral task
behavioral1
Sample
c6a2c7ab9bb3ecedc24973edc30820e0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6a2c7ab9bb3ecedc24973edc30820e0.dll
Resource
win10v2004-20240226-en
Target
c6a2c7ab9bb3ecedc24973edc30820e0
Size
39KB
MD5
c6a2c7ab9bb3ecedc24973edc30820e0
SHA1
9a1b130b8f3979d56dfee13f4ce27cf2461a946b
SHA256
eaa19448ca7c02e95ef430181ca16e5a4201329922513bb70cb7f1703293e228
SHA512
e1b5bffb39d50b31ca17590c12fc863b93b31b0e7304177d1c6c41a0a199ad43ba538de3c5d84570ad47ecda848fdfe81b5acc9e2a6ada1b292e6aa4d1ec3bec
SSDEEP
768:qURY2qmcgrABfSzlPUPdFyBE+iNGofun88Xxrz15G5M:qUhhAZSzlSKE+iwP8Cl5G5M
Checks for missing Authenticode signature.
resource |
---|
c6a2c7ab9bb3ecedc24973edc30820e0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrCmpNIA
PathFileExistsA
StrChrA
SHDeleteKeyA
StrRChrA
StrStrA
StrStrIA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
URLDownloadToFileA
lstrcatA
InterlockedDecrement
InterlockedIncrement
SetEvent
CreateEventA
GetVolumeInformationA
Sleep
ReadFile
SetFilePointer
CreateFileA
GetCurrentProcess
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateMutexA
LoadLibraryA
VirtualAlloc
VirtualFree
SystemTimeToFileTime
GetSystemTime
GetVersionExA
lstrcmpiA
GetModuleFileNameA
ExitProcess
MoveFileA
GetTickCount
CreateProcessA
FreeLibrary
CopyFileA
GetTempPathA
GetSystemDirectoryA
VirtualProtect
FlushInstructionCache
SetLastError
ReleaseMutex
OpenMutexA
WriteFile
OutputDebugStringA
lstrcpynA
HeapAlloc
GetProcessHeap
GetFileSize
FreeLibraryAndExitThread
FileTimeToSystemTime
GetSystemTimeAsFileTime
LocalFree
SetEndOfFile
GetWindowsDirectoryA
CreateDirectoryA
GetLastError
lstrcmpA
TerminateThread
TerminateProcess
OpenSemaphoreA
CreateToolhelp32Snapshot
Process32First
lstrlenA
Process32Next
CloseHandle
lstrcpyA
CreateThread
CharLowerA
CreateWindowExA
SetWindowLongA
PeekMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
CharUpperA
wsprintfA
RegSetValueExA
RegOpenKeyExA
RegFlushKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
SetEntriesInAclA
SetNamedSecurityInfoA
RegEnumKeyA
RegDeleteKeyA
RegSetValueA
RegQueryValueA
CoCreateGuid
DllCanUnloadNow
DllGetClassObject
a
f
h
o
s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ