DllRegisterServer
DllUnregisterServer
PauseW
ResumeW
StartW
pStartW
Static task
static1
Behavioral task
behavioral1
Sample
d52f5da10e84853f15706133e967ab6b.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d52f5da10e84853f15706133e967ab6b.dll
Resource
win10v2004-20240226-en
Target
d52f5da10e84853f15706133e967ab6b
Size
1.3MB
MD5
d52f5da10e84853f15706133e967ab6b
SHA1
e89558c040cc24b38a79e29f5b3fb8fe1e6300b9
SHA256
9d91621ca1c2a3bca8c74836bde3fbb8afbbc7c657f6630fd338fce8d8250965
SHA512
aa8a3500b4417271117a6acb3fa09485cb01a6eef1ebc9d5107a87155cfddf404139714e8ef9254c3a0076c6ca4a8a94ccd6a0c12434059b941d7b3de6569d99
SSDEEP
24576:bhCbYfOMaeAgeLut7oFGaDxcA7vw/9EYabCo:bcbYfGFBVxcA8V5aZ
Checks for missing Authenticode signature.
Processes:
resource |
---|
d52f5da10e84853f15706133e967ab6b |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
WaitForSingleObjectEx
WriteConsoleW
GetTickCount
Sleep
GetProcessHeap
HeapAlloc
HeapFree
CreateMutexA
GetLastError
GetCommandLineA
ExitProcess
CreateProcessA
GetModuleHandleA
GetProcAddress
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
GetThreadContext
SetThreadContext
ResumeThread
CloseHandle
VirtualFreeEx
TerminateProcess
OutputDebugStringA
Process32First
GetCommandLineW
WriteFile
VirtualAlloc
OpenProcess
CreateToolhelp32Snapshot
CreateFileA
Process32Next
K32GetModuleBaseNameA
GetCurrentProcessId
K32EnumProcessModules
VirtualProtect
SetLastError
VirtualFree
LoadLibraryA
GetNativeSystemInfo
FreeLibrary
IsBadReadPtr
SetConsoleCtrlHandler
FindFirstFileW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetCurrentProcess
GetStdHandle
SetFileTime
GetEnvironmentVariableA
FindClose
CreateFileW
LoadLibraryW
SetCurrentDirectoryW
SystemTimeToFileTime
GetSystemTime
DebugBreak
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
RtlUnwind
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
HeapCompact
HeapDestroy
UnlockFile
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
FlushFileBuffers
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetStringTypeW
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetModuleHandleExW
FindFirstFileExW
FindNextFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
DuplicateHandle
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
CompareStringW
LCMapStringW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileSizeEx
GetConsoleCP
GetExitCodeProcess
CreatePipe
SetStdHandle
GetCurrentDirectoryW
SetFileAttributesW
CreateDirectoryW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
DllRegisterServer
DllUnregisterServer
PauseW
ResumeW
StartW
pStartW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ