DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
cae783f09a2aa93ec2a930a43d153e45.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cae783f09a2aa93ec2a930a43d153e45.dll
Resource
win10v2004-20240226-en
Target
cae783f09a2aa93ec2a930a43d153e45
Size
307KB
MD5
cae783f09a2aa93ec2a930a43d153e45
SHA1
a8dcf29d778cb2962b60bd45adf0b29cb789f1e9
SHA256
d48172ce113eb7dc36ee4393557b7cfafd3d06b18d513e0597b2fafedcf17345
SHA512
fea2d83763c895ae57b4ac6620bfac781e79304b7468bcc1df5561f3c5c2422ad03cc7a3b90a9847749a82c6807c51f127e4279de923ee9d2517d14e2af7d98c
SSDEEP
6144:KllCH2WKaDgwPSCL4bwfuE1PXibsnrXQ8n:KllCWWKaDgyX2QuEhM+
Checks for missing Authenticode signature.
resource |
---|
cae783f09a2aa93ec2a930a43d153e45 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DuplicateHandle
OpenProcess
TerminateProcess
SetFileAttributesA
GetFileAttributesA
Sleep
DeleteFileA
WideCharToMultiByte
CreateDirectoryA
GetLocalTime
CopyFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
GetTickCount
CreateRemoteThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ResumeThread
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
GetCommandLineW
OpenMutexA
GetTempPathA
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
LockResource
FreeResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
GetCurrentProcess
GetLongPathNameA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
Toolhelp32ReadProcessMemory
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
FormatMessageA
LocalFree
SetLastError
GetWindowsDirectoryA
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
GetTimeZoneInformation
HeapReAlloc
lstrlenA
GetSystemTime
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
BeginUpdateResourceA
FindWindowExA
FindWindowA
PostMessageA
wsprintfA
GetWindowThreadProcessId
KillTimer
DefWindowProcA
RegisterClassExA
CreateWindowExA
SetTimer
MessageBoxA
ShowWindow
SetWindowLongA
SendMessageA
EnumChildWindows
GetWindowRect
SetWindowPos
GetParent
GetClassNameA
GetWindowTextA
GetDesktopWindow
IsWindowVisible
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
LookupAccountSidA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CommandLineToArgvW
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
SHFileOperationA
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromString
SysStringLen
LoadRegTypeLi
SysFreeString
SysAllocString
VariantCopy
VariantChangeType
VariantClear
SysAllocStringLen
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ord31
ord16
ord21
ord18
ord57
ord23
ord15
ord32
ord30
ord58
GetModuleFileNameExA
SHDeleteKeyA
Netbios
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ