StartHook
StopHook
Static task
static1
Behavioral task
behavioral1
Sample
07db7ef0fd622e5b80fbf73551b2afd284bebbcfde681434666b573a14ae8026.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07db7ef0fd622e5b80fbf73551b2afd284bebbcfde681434666b573a14ae8026.dll
Resource
win10v2004-20240508-en
Target
07db7ef0fd622e5b80fbf73551b2afd284bebbcfde681434666b573a14ae8026
Size
3.1MB
MD5
7418815a933c0ac8da35c53ac616e3ff
SHA1
05cde7b75ffca5d16dd0ece810d2df95b14b5829
SHA256
07db7ef0fd622e5b80fbf73551b2afd284bebbcfde681434666b573a14ae8026
SHA512
abbf889427f3ed8452c41134f1aeb6d522a29d2f3d1e8d9688936363d40c96709a31860da0b8abeba3d9b228596e535fa7218791276ceaef6e17255e33c15ef3
SSDEEP
49152:dWbgtrYnt3b2QBIoIwvcW7G0NXLanWlTzr25DcOlclTZWP3/Bcx:MTnt3bocvxVakzi5Dhe1W3Bc
Checks for missing Authenticode signature.
resource |
---|
07db7ef0fd622e5b80fbf73551b2afd284bebbcfde681434666b573a14ae8026 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D3DXCreateLine
D3DXCreateSprite
D3DXCreateTextureFromFileA
D3DXCreateFontA
CreateFileW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetSystemInfo
HeapAlloc
IsWow64Process
GetCurrentProcess
HeapCreate
GetSystemDirectoryA
ReadFile
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
LoadLibraryW
OutputDebugStringA
ExitProcess
VirtualProtect
HeapFree
MultiByteToWideChar
GetLastError
QueryDosDeviceW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
WideCharToMultiByte
OpenProcess
TerminateProcess
LocalAlloc
LocalFree
GetLocalTime
ReadProcessMemory
GetFileInformationByHandle
SetFilePointer
CreateEventA
AddVectoredExceptionHandler
GetCommandLineA
CreateThread
QueueUserWorkItem
WaitForSingleObject
GlobalLock
GlobalUnlock
GetTickCount
WriteFile
FindResourceA
SizeofResource
LoadResource
LockResource
CloseHandle
SetEvent
FreeLibrary
lstrcatA
lstrlenA
TerminateThread
GlobalMemoryStatusEx
lstrlenW
lstrcpyW
ResetEvent
CancelIo
WaitForMultipleObjects
InterlockedExchange
GetStartupInfoW
GetSystemDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
GetACP
GetModuleHandleExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
GetVersionExW
LoadLibraryExW
GetModuleFileNameW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
SetEndOfFile
GetConsoleCP
FreeLibraryAndExitThread
GetThreadTimes
HeapSize
WriteConsoleW
SetStdHandle
GetProcessHeap
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
GetTimeZoneInformation
HeapReAlloc
Sleep
VirtualQuery
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
EncodePointer
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThread
GetCurrentDirectoryW
FindClose
FindFirstFileExW
GetFileAttributesExW
AreFileApisANSI
SetLastError
GetModuleHandleW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
FlushFileBuffers
EnumChildWindows
GetClassNameA
GetWindowTextLengthA
GetWindowTextA
MessageBoxA
IsWindow
SetTimer
GetWindowLongA
PostMessageA
GetAsyncKeyState
OpenClipboard
GetClipboardData
CloseClipboard
SendMessageA
SetWindowsHookExA
SetForegroundWindow
GetCursorPos
SetCursorPos
UnhookWindowsHookEx
GetParent
EnumWindows
GetCursorInfo
DestroyCursor
LoadCursorA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ShellExecuteA
CoInitializeEx
GetExtendedTcpTable
AddIPAddress
NtTerminateProcess
NtSetInformationProcess
NtQueryVirtualMemory
NtProtectVirtualMemory
NtQuerySystemInformation
NtQueryInformationProcess
RtlImageNtHeader
RtlDecompressBuffer
htons
setsockopt
select
inet_addr
WSAStartup
getaddrinfo
WSACleanup
WSAConnect
WSARecv
WSASend
closesocket
WSAAsyncSelect
ioctlsocket
connect
send
recv
WSAEnumNetworkEvents
WSAEventSelect
socket
WSAGetLastError
inet_ntoa
getsockname
freeaddrinfo
WSAIoctl
PathFindFileNameW
StartHook
StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ