COMResModuleInstance
SetMsgHook
ins
Static task
static1
Behavioral task
behavioral1
Sample
c8a9f2622242c7cf68bb98231a809b7f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8a9f2622242c7cf68bb98231a809b7f.dll
Resource
win10v2004-20240226-en
Target
c8a9f2622242c7cf68bb98231a809b7f
Size
11KB
MD5
c8a9f2622242c7cf68bb98231a809b7f
SHA1
45fc4b213183f68948238514195512db432ce17a
SHA256
e1df3db1ebf7bb04deb789a64c80c05c335c3ed0edec02b656bc8c26ffa2ece6
SHA512
cc4664126182d74d5700a30e51b57e0e7d97a6166c82745be006735bac4a7d4626bbdd48db22dc37ad159b0dfb1062723dd37fd97cdd7932a3c5cb8f1a895b74
SSDEEP
96:uWx9QSDOb3Z9DxQNWccFtqcwilBiJhEpWpvos7sx98vebXtYW/uNs7Q5+REO+Q/p:GSDOkKkJ7hVxvebeh5tAp
Checks for missing Authenticode signature.
resource |
---|
c8a9f2622242c7cf68bb98231a809b7f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
CreateToolhelp32Snapshot
WriteProcessMemory
WideCharToMultiByte
lstrlenA
lstrlenW
Module32Next
Module32First
GetWindowsDirectoryA
lstrcmpiA
lstrcatA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
FindClose
FindNextFileA
FindFirstFileA
Process32Next
FreeLibrary
GetCurrentThreadId
DeleteFileA
OpenEventA
SetEvent
LoadLibraryA
CreateMutexA
ReleaseMutex
RtlZeroMemory
OpenProcess
GetLastError
RtlFillMemory
lstrcpyA
GetCurrentProcessId
Sleep
GetModuleFileNameA
CreateThread
CloseHandle
GetMessageA
PostThreadMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
EnumWindows
SetWindowsHookExA
wsprintfA
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
PathFileExistsA
StrStrIA
strrchr
strcpy
strcmp
strcat
COMResModuleInstance
SetMsgHook
ins
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ