DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HttpPostFile
Static task
static1
Behavioral task
behavioral1
Sample
7834eadb93fb8bf5a933991ad234b4b31358e7984e868f9b655edfb0d7a80e27.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7834eadb93fb8bf5a933991ad234b4b31358e7984e868f9b655edfb0d7a80e27.dll
Resource
win10v2004-20240508-en
Target
7834eadb93fb8bf5a933991ad234b4b31358e7984e868f9b655edfb0d7a80e27
Size
616KB
MD5
350972054565cf4c40cfda6c95fd504a
SHA1
be5a9c2b5aab4f13f7fded299ee07b4d4f23c927
SHA256
7834eadb93fb8bf5a933991ad234b4b31358e7984e868f9b655edfb0d7a80e27
SHA512
2923afca6443ea2230bf973606f0d55c0ba7fb2553b0d8d13c0b7dab2013aa88a39bd87ea9681a529c73640e398a2ae3ca934d3450978429af49af01ad823005
SSDEEP
12288:jzvV0fr/ATrQ5ABeDDfsYFpf2/TxVmTF5Cmmq443vQ:/V0frYPQ5AUsYFJ2vmTj7mqP
Checks for missing Authenticode signature.
resource |
---|
7834eadb93fb8bf5a933991ad234b4b31358e7984e868f9b655edfb0d7a80e27 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
CompareStringA
HeapAlloc
GetProcessHeap
HeapFree
GetComputerNameA
lstrlenA
WriteFile
ReadFile
GetFileTime
SetFileTime
CloseHandle
WaitForMultipleObjects
SetLastError
ResetEvent
SetEvent
LCMapStringA
GetStringTypeA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetTickCount
LocalAlloc
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapSize
CreateThread
ExitThread
GetOEMCP
TerminateProcess
ExitProcess
RtlUnwind
FileTimeToSystemTime
GetLocalTime
CompareFileTime
InterlockedIncrement
InterlockedDecrement
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
RaiseException
DisableThreadLibraryCalls
LoadResource
SizeofResource
FreeLibrary
GetLastError
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEnvironmentVariableA
FlushFileBuffers
GetCommandLineA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
OpenProcess
GetCurrentProcessId
SetFilePointer
GetCurrentThreadId
FindClose
GetFileSize
ReleaseMutex
WaitForSingleObject
LocalFree
GetCurrentProcess
GetTimeZoneInformation
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
Sleep
SetThreadPriority
ResumeThread
GlobalAlloc
GlobalFree
GetThreadPriority
GetVersionExA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
MsgWaitForMultipleObjects
OpenWindowStationW
CloseWindowStation
AllocateAndInitializeSid
ReportEventW
RegisterEventSourceW
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
RevertToSelf
EqualSid
OpenProcessToken
CopySid
GetSidLengthRequired
ImpersonateLoggedOnUser
GetTokenInformation
LookupAccountSidW
GetAce
GetAclInformation
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
DeregisterEventSource
InitializeSecurityDescriptor
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptDestroyHash
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptSetProvParam
CryptAcquireContextA
RegCloseKey
CoInitializeEx
CLSIDFromString
OleRun
ProgIDFromCLSID
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateGuid
CoUninitialize
VariantChangeType
VariantCopy
CreateErrorInfo
SetErrorInfo
SysAllocStringByteLen
SysStringByteLen
DispCallFunc
VariantClear
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VariantInit
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayLock
SafeArrayUnlock
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetVartype
GetErrorInfo
send
shutdown
socket
bind
setsockopt
getsockopt
listen
closesocket
htons
WSAGetLastError
gethostbyname
WSAStartup
WSACleanup
htonl
connect
recvfrom
sendto
recv
select
accept
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HttpPostFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ