DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Static task
static1
Behavioral task
behavioral1
Sample
5d00ef57c815417ced2041c1c887f9a1405e9ff792cf399e08fa3f7a2b977c80.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d00ef57c815417ced2041c1c887f9a1405e9ff792cf399e08fa3f7a2b977c80.dll
Resource
win10v2004-20240508-en
Target
b94c03266ea57e9997b489d4b5b61459.bin
Size
33KB
MD5
f9405bbd829c659b9a2d1c8170d6680b
SHA1
07bda8c5b07713e8f4957dad93503511e7a76c6c
SHA256
af49f62bca9a9af59da74482a03eddd39ac0a9338a3b3c71b8f1277aa7610ff2
SHA512
ca0cd62b858dd895b7af60bfea56dfb52247d9046500a095593d87c447b9b62f73b3c88666b84d239e4ec2b72f6c4d3194c89716a3150076a1eeb3beb277ec26
SSDEEP
768:EHpltMHwd1K2/otmnTExY6gQGjUhA1AX9uzejt/OJxAVn:yyH8b/CcTXtm9Sejt/O4
Checks for missing Authenticode signature.
resource |
---|
unpack001/5d00ef57c815417ced2041c1c887f9a1405e9ff792cf399e08fa3f7a2b977c80.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
CloseHandle
CreateFileW
CreateMutexW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
GetCommandLineW
GetComputerNameExW
GetComputerNameW
GetCurrentDirectoryW
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemInfo
GetTickCount
GetVolumeInformationW
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
PeekNamedPipe
ReadFile
SetCurrentDirectoryW
SetFilePointer
SetHandleInformation
SetLastError
Sleep
TerminateProcess
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
___lc_codepage_func
___mb_cur_max_func
__iob_func
_amsg_exit
_errno
_initterm
_lock
_unlock
_wcsnicmp
abort
calloc
fputwc
free
fwprintf
fwrite
localeconv
malloc
memcpy
memset
realloc
strcat
strcpy
strerror
strlen
strncmp
vfprintf
wcscat
wcscmp
wcscpy
wcslen
SHGetFolderPathW
WSACleanup
WSAStartup
gethostbyname
gethostname
inet_ntoa
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ