Entry
GetStatus
InstallHook
Run
UnHook
_EventLogon@4
_EventStartup@4
Static task
static1
Behavioral task
behavioral1
Sample
d374b83a6cc0ce66a3b742246b409fd8.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d374b83a6cc0ce66a3b742246b409fd8.dll
Resource
win10v2004-20240226-en
Target
d374b83a6cc0ce66a3b742246b409fd8
Size
97KB
MD5
d374b83a6cc0ce66a3b742246b409fd8
SHA1
a1bb1f7cbe65e1fa9973a4325c7dedb9b433f828
SHA256
a20c72207aa7885c28a2e699b9aea79f07f8543f5d0ec42d98ae920d60f96e82
SHA512
12a7450208d97ae0efad05effb8c81a6e8acd58e7cd97bb4e9aaa4c8817a169a797d8075eb48f877d3801d76d15b3384bff35c2fc5cbae57e8cf0b24d98a68d0
SSDEEP
1536:ppzZukTSV0CkjThOQK7U0HTicsFyfCDfcneFn2LF/3lyq3uWPRmCr:pnukW0CkoQUdThKpUFflyq3uWPB
Checks for missing Authenticode signature.
resource |
---|
d374b83a6cc0ce66a3b742246b409fd8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateToolhelp32Snapshot
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
VirtualProtectEx
GetTickCount
VirtualProtect
lstrlenA
GetModuleHandleA
GlobalFree
SetFilePointer
lstrcatA
GlobalAlloc
lstrlenW
CreateRemoteThread
VirtualAlloc
ReadFile
GetFileSize
VirtualFree
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
GetCurrentProcess
TerminateProcess
GlobalReAlloc
GlobalLock
GlobalSize
GlobalMemoryStatus
GlobalUnlock
GetEnvironmentVariableA
GetStartupInfoA
CreatePipe
GetCurrentDirectoryA
GetSystemWindowsDirectoryA
GetVersionExA
RtlUnwind
GetCommandLineA
InterlockedExchange
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
Process32First
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
UnhandledExceptionFilter
IsBadWritePtr
GetLocaleInfoA
GetCPInfo
GetStringTypeA
GetStringTypeW
GetOEMCP
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapSize
MultiByteToWideChar
Process32Next
OpenProcess
GetACP
WideCharToMultiByte
GetFileTime
SetFileTime
RemoveDirectoryA
CreateDirectoryA
SetFileAttributesA
MoveFileExA
FindNextFileA
GetDriveTypeA
GetLocalTime
GetTempPathA
GetLongPathNameA
FindFirstFileA
DeleteFileA
FindClose
CreateProcessA
CreateFileA
WriteFile
LocalFree
FormatMessageA
SetLastError
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
FreeLibrary
GetModuleFileNameA
GetCurrentThreadId
CreateMutexA
ReleaseMutex
CloseHandle
GetSystemDirectoryA
CreateThread
WaitForSingleObject
GetCurrentProcessId
OpenMutexA
GetLastError
Sleep
LoadLibraryA
LCMapStringW
GetProcAddress
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetSystemMetrics
CloseDesktop
CloseWindowStation
FindWindowA
GetDesktopWindow
ShowCursor
GetDC
GetWindowDC
ReleaseDC
mouse_event
SetCursorPos
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
ClipCursor
SetWindowPos
ShowWindow
wsprintfA
EnableWindow
ExitWindowsEx
MessageBoxA
GetActiveWindow
wsprintfW
GetWindowTextA
LockWorkStation
IsRectEmpty
DeleteObject
GetStockObject
GetObjectA
DeleteDC
StretchBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateDCA
GetDIBits
RealizePalette
SelectPalette
CloseEventLog
RegOpenKeyA
GetUserNameA
RegQueryValueExA
RegCreateKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
QueryServiceStatus
StartServiceA
OpenServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
ControlService
LookupAccountSidA
ClearEventLogA
OpenEventLogA
LsaNtStatusToWinError
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
GetTokenInformation
ShellExecuteA
select
listen
bind
ioctlsocket
socket
gethostbyname
gethostname
recv
WSACleanup
accept
getsockopt
inet_ntoa
WSAStartup
closesocket
inet_addr
setsockopt
connect
send
htons
URLDownloadToFileA
GetUrlCacheEntryInfoA
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
GetModuleFileNameExA
EnumProcessModules
capGetDriverDescriptionA
Entry
GetStatus
InstallHook
Run
UnHook
_EventLogon@4
_EventStartup@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ