LaunchSTA
LaunchSTALink
STA_NSPStartupCalled
STA_WSPStartupCalled
ShellRun
apijack_on_process_start
sta_on_process_start_callback
Static task
static1
Behavioral task
behavioral1
Sample
d25feefe8b9cd564866fa5e3beb195b4cd5592461f9f1d5d81ee467e3bab1625.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d25feefe8b9cd564866fa5e3beb195b4cd5592461f9f1d5d81ee467e3bab1625.dll
Resource
win10v2004-20240508-en
Target
d25feefe8b9cd564866fa5e3beb195b4cd5592461f9f1d5d81ee467e3bab1625
Size
128KB
MD5
4e0b44995d3fc430181e765e201f1918
SHA1
1f21bdf2e66ea5760c75e862f8c3ff60adc4645c
SHA256
d25feefe8b9cd564866fa5e3beb195b4cd5592461f9f1d5d81ee467e3bab1625
SHA512
2aebe6c4b5bfab535e10cca580f9f17cbfa1b09fff51d703aa0bff19be5e1f306af96e0223ef917ef352699af8b1a8b713bae37cc928c0af52406d111f3dc77b
SSDEEP
3072:HNWa3q9/F/MnGgGo+UTWyuBzRValL8DLV:tLgSnGq+bzHDt
Checks for missing Authenticode signature.
resource |
---|
d25feefe8b9cd564866fa5e3beb195b4cd5592461f9f1d5d81ee467e3bab1625 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageDirectoryEntryToData
AddAccessAllowedAce
InitializeAcl
CreateProcessAsUserA
CreateProcessAsUserW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeSid
RegSetValueExA
GetSidLengthRequired
GetLengthSid
IsValidSid
GetSidSubAuthority
RegCreateKeyExA
GetWindowRect
PostQuitMessage
GetMessageA
PostThreadMessageA
FindWindowA
wsprintfA
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseDC
InflateRect
FrameRect
OffsetRect
MapWindowPoints
TranslateMessage
GetWindowDC
SendMessageA
CallWindowProcA
CallWindowProcW
IsWindowUnicode
CallNextHookEx
SetWindowLongA
SetWindowLongW
DispatchMessageA
MessageBoxA
MessageBoxExA
GetWindowThreadProcessId
WSAGetLastError
ntohs
gethostname
WSASetLastError
inet_ntoa
socket
htonl
closesocket
inet_addr
CreateSolidBrush
DeleteObject
FindExecutableA
ShellExecuteExA
ShellExecuteW
FindExecutableW
ShellExecuteA
ShellExecuteExW
GetTickCount
IsDebuggerPresent
FormatMessageA
LocalFree
OutputDebugStringA
GetVersionExA
VirtualProtect
SetLastError
GetModuleFileNameA
GetConsoleTitleA
IsBadReadPtr
Sleep
ExpandEnvironmentStringsA
SetConsoleTitleA
DisableThreadLibraryCalls
GetCurrentThreadId
WaitForSingleObject
GetThreadContext
VirtualAllocEx
CreateEventA
WriteFile
ReadFile
WaitNamedPipeA
SetNamedPipeHandleState
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TlsFree
GetCurrentProcessId
TlsGetValue
TlsSetValue
TlsAlloc
DeleteFileA
ReleaseMutex
TryEnterCriticalSection
CreateMutexA
CloseHandle
OpenProcess
VirtualQuery
GetProcAddress
SetEnvironmentVariableA
LoadLibraryA
GetModuleHandleA
CreateProcessA
CreateProcessW
GetLastError
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
GetEnvironmentVariableA
GetLongPathNameA
ResumeThread
SetThreadContext
WriteProcessMemory
CreateThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
EnumProcessModules
_onexit
_strdup
_unlink
_access
__dllonexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
_wcslwr
strncmp
free
fclose
exit
_iob
fprintf
rename
fseek
ftell
abort
time
localtime
_vsnprintf
fwrite
fflush
strtok
realloc
memmove
wcsncmp
strncpy
strlen
malloc
strchr
fopen
strcmp
_stricmp
memset
strncat
strcat
strcpy
strstr
_strlwr
wcscpy
wcsstr
calloc
getenv
_mkdir
_except_handler3
sprintf
__p__environ
__CxxFrameHandler
_snprintf
sscanf
atoi
_strnicmp
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
_snwprintf
memcmp
??_Dofstream@@QAEXXZ
??0ifstream@@QAE@PBDHH@Z
??6ostream@@QAEAAV0@K@Z
??1ios@@UAE@XZ
??1ofstream@@UAE@XZ
??6ostream@@QAEAAV0@PBD@Z
??0ofstream@@QAE@PBDHH@Z
?openprot@filebuf@@2HB
?getline@istream@@QAEAAV1@PADHD@Z
??1ifstream@@UAE@XZ
?close@ifstream@@QAEXXZ
??_Difstream@@QAEXXZ
LaunchSTA
LaunchSTALink
STA_NSPStartupCalled
STA_WSPStartupCalled
ShellRun
apijack_on_process_start
sta_on_process_start_callback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ