DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0x00070000000234bd-3.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0x00070000000234bd-3.dll
Resource
win10v2004-20240802-en
Target
malware.dll_pw_infected.zip
Size
12KB
MD5
af37724634bd3e036b439e1132a3a340
SHA1
323c01f3d2586f0537c862df2fc53ee73d3b7dce
SHA256
c2bff8289e05b3e28f4566b8747cda5329bb8be1c974b1260cdd329b6ae7db02
SHA512
59fda7ce93676f57b749d2aa5e46f49e7f2e44ee80151e070c64eb7e8da0224b81482fcf91164b999cb3c83d5888f40af15199dba66d1bda905fcbf15d29cd79
SSDEEP
192:zs375cDNuYnhCPjmc/l6utiBX4WzazBoqsGtrwKFK4d+1u09fIoLmpCaaQKhgADU:zsm5kh/l6EE+aYtEKFw1NlmcLQegDmE
Checks for missing Authenticode signature.
resource |
---|
unpack001/0x00070000000234bd-3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_DLL
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExW
RegQueryValueExW
DisableThreadLibraryCalls
GetProcessHeap
GetSystemInfo
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameA
GetCommandLineA
lstrlenA
lstrcmpiA
HeapAlloc
TlsAlloc
FreeLibrary
HeapFree
TlsFree
TlsSetValue
SetLastError
GetLastError
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
FormatMessageW
LocalFree
lstrcmpiW
IsValidCodePage
RtlMoveMemory
VirtualAlloc
VirtualFree
GetModuleHandleA
IsEqualGUID
CoGetContextToken
SysFreeString
SysAllocString
SysAllocStringLen
_wcsicmp
wsprintfA
LoadStringW
wsprintfW
MessageBoxW
SHDeleteKeyA
StrToIntW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ