APIExportForDetours
CurrentThreadIsVirtualized
IsProcessHooked
RequestUnhookedFunctionList
VirtualizeCurrentProcess
VirtualizeCurrentThread
Static task
static1
Behavioral task
behavioral1
Sample
Note/AppvIsvSubsystems64.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Note/AppvIsvSubsystems64.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Note/Note.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Note/Note.exe
Resource
win10v2004-20240226-en
Target
459cc8a6eca9aae2abc4de0b93b9e0a6c439a86b0e3737b4e02f9e98f039c85b
Size
700KB
MD5
efe86302838ad2ab091540f4e0f7b75a
SHA1
5c3b7dae83a2247f8a8e49e3663b0863f7ec3e70
SHA256
459cc8a6eca9aae2abc4de0b93b9e0a6c439a86b0e3737b4e02f9e98f039c85b
SHA512
8dbcd952685f0247dcd50ef75de458f683ec5be9afd6d75e4bb8eb93ab13365ada3a97ecbad553ad7f6564f53b56eb1d9ba042846b76920ca148b9525210d2f4
SSDEEP
12288:9hVWTe4JePLzK4jKWtEVvAlpPGeUBa8GXOUn3P+2ZHv1wHVYjH9v+HA:9hVWT32KKKJ4l0eqa7ZtfwHVYjt+g
Checks for missing Authenticode signature.
resource |
---|
unpack001/Note/AppvIsvSubsystems64.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
EnterCriticalSection
InitializeSListHead
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CloseHandle
__std_type_info_destroy_list
memset
__C_specific_handler
memcpy
exit
_initterm_e
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_initterm
_cexit
fopen_s
fread_s
ftell
fseek
fclose
free
APIExportForDetours
CurrentThreadIsVirtualized
IsProcessHooked
RequestUnhookedFunctionList
VirtualizeCurrentProcess
VirtualizeCurrentThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\dbs\el\na1\Target\x64\ship\postc2r\x-none\winword.pdb
DllGetLCID
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ