SetBlockMsg
_hookproc@12
_mousehookproc@12
enablehook
installhook
installmousehook
removehook
removemousehook
Static task
static1
Behavioral task
behavioral1
Sample
9b053016e3d5a40586b72b40011125fbc1ab8acce34f46e88297c34e4181317f.dll
Resource
win7-20240708-en
Target
9b053016e3d5a40586b72b40011125fbc1ab8acce34f46e88297c34e4181317f
Size
110KB
MD5
4280b384948b5dce2df365ea3a8adaf1
SHA1
888603223d656f52ce8de67eba4158a38f23eadb
SHA256
9b053016e3d5a40586b72b40011125fbc1ab8acce34f46e88297c34e4181317f
SHA512
b6acd26fe51545ef35b399ed9c630b5dfaf1b4ad82da1619838883ea647506a9681cb0020d81836afc1b1e4bd62179d4c91d00066969f4e02cbee9e407a9d542
SSDEEP
1536:GdSjRIV31t2laHcl9e5Qads9BjqL+cJ62xE/khpnuKkLbnzSuw:LlIJvw9e5jdI6+cE2E/khMKkLbnzSu
Checks for missing Authenticode signature.
resource |
---|
9b053016e3d5a40586b72b40011125fbc1ab8acce34f46e88297c34e4181317f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetWindowsHookExA
PostMessageA
CallNextHookEx
UnhookWindowsHookEx
SetFilePointer
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
CloseHandle
FlushFileBuffers
SetBlockMsg
_hookproc@12
_mousehookproc@12
enablehook
installhook
installmousehook
removehook
removemousehook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE