DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6542d82345a5315bbffbeb7d060a8140N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6542d82345a5315bbffbeb7d060a8140N.dll
Resource
win10v2004-20240709-en
Target
6542d82345a5315bbffbeb7d060a8140N.exe
Size
18KB
MD5
6542d82345a5315bbffbeb7d060a8140
SHA1
bc304154572ed4118290a44a44e4847c33caeab1
SHA256
5de34411e6d48e5fda7d19183b8d5f92e7babd8f74d036aa7f5a9bc88cf1209e
SHA512
cb531ca5c87bc3b7bd73bd3e90e3e9e79c4ec63161a6fa020d73cb10b46dc477f6564ea353720f832a0266c91ce631a3fdbdb2c2c99957201d997ea8c2a80607
SSDEEP
384:xPi9sJM9yz+oVQbygYP8IjguNyvH4xcYz1lLUVR9KUStTcw+:2s2QC8QbydP8ug+yvH4xtZlLUXpStTT+
Checks for missing Authenticode signature.
resource |
---|
6542d82345a5315bbffbeb7d060a8140N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitThread
GetModuleFileNameA
lstrcatA
GetProcAddress
GetModuleHandleA
CompareStringW
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
lstrcmpA
LeaveCriticalSection
Sleep
HeapAlloc
GetProcessHeap
ReadFile
SetFilePointer
HeapFree
CreateMutexA
ReleaseMutex
SetEndOfFile
GetSystemDirectoryW
MultiByteToWideChar
WideCharToMultiByte
WriteProcessMemory
VirtualProtect
IsBadStringPtrA
lstrcpyW
GetTickCount
lstrlenA
GetCurrentProcess
WaitForSingleObject
CreateThread
SetEvent
CreateEventA
lstrcmpiA
GetSystemDirectoryA
lstrcpyA
CreateFileA
WriteFile
CloseHandle
EnterCriticalSection
HeapReAlloc
wsprintfA
CharUpperW
CharLowerA
wsprintfW
CryptHashData
CryptEncrypt
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptCreateHash
CryptAcquireContextA
CryptDecrypt
RegOpenKeyExA
CryptDeriveKey
StringFromIID
CoGetMalloc
SysAllocString
SysFreeString
InternetConnectA
InternetCrackUrlW
InternetCrackUrlA
CoInternetCombineUrl
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ