DB43ADECEFE431EB
EntryProc
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
wzAudioCreate
wzAudioDestroy
wzAudioOption
wzAudioPlay
wzAudioStop
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PossibleThreat.PALLASNET.H.14592.12237.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.PossibleThreat.PALLASNET.H.14592.12237.dll
Resource
win10v2004-20240419-en
Target
SecuriteInfo.com.PossibleThreat.PALLASNET.H.14592.12237.dll
Size
1.5MB
MD5
3da8da722c992d600269cda1c426bf42
SHA1
907c2858067e846d4a3468b3539afc84197c801c
SHA256
ddb483deaee1bdb53fce952ac3530db9659c516904c34c94cf6c9668bd74e239
SHA512
c7817daa2a0de102e76a257adcc7f51702fca958b1ad802453027976912d30ae6d5aeaeff69233f6ecfffaf5bea60f6e5975bbaa6d51bc0403aa89eaab26dfc9
SSDEEP
24576:Eliwdb+9yJa3EuV79HJFwdkC45wnVigp/luM7PDmWTmOyv3+2B4aNQpyQKTMwnq7:Ewwdbq3nRHTzC2wnoQ/Jrmsyv3+G4aNJ
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.PossibleThreat.PALLASNET.H.14592.12237.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
DocumentPropertiesW
ImageList_GetImageInfo
Shell_NotifyIconW
CopyImage
GetFileVersionInfoSizeW
SafeArrayPutElement
RegSetValueExW
NetWkstaGetInfo
memcpy
gethostbyaddr
IsEqualGUID
Pie
DB43ADECEFE431EB
EntryProc
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
wzAudioCreate
wzAudioDestroy
wzAudioOption
wzAudioPlay
wzAudioStop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE