DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
cb2b94c83a07ea16ff5cec9741ade200N.dll
Resource
win7-20240708-en
Target
cb2b94c83a07ea16ff5cec9741ade200N.exe
Size
64KB
MD5
cb2b94c83a07ea16ff5cec9741ade200
SHA1
f8bb7a03de46f6dd881d9f6f6c20984c56ab6db8
SHA256
1ac257aee0b1fb241ca12e818fe2899c6b60ff0d5443a1c62c585ae5db64f6e2
SHA512
f46550f0578136794a19f4c24377094c4e92344a87ba4efff04c2a64c2953897408e510dc69cba1af8e6a86f925caf14c6498de159ec022c14258d63bbec54b3
SSDEEP
1536:rgQHjV7UUQn7wPPpth/pscXm0bTFsewA:kQHjVwMxpTXm0bpRw
Checks for missing Authenticode signature.
resource |
---|
cb2b94c83a07ea16ff5cec9741ade200N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetCurrentProcessId
CloseHandle
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateProcessA
GetSystemDirectoryA
GetProcAddress
WideCharToMultiByte
GetCommandLineW
FreeLibrary
LocalFree
MoveFileA
SetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
Process32Next
Process32First
WritePrivateProfileStringA
GetExitCodeProcess
WaitForSingleObject
DeleteFileA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateThread
EnterCriticalSection
Sleep
LeaveCriticalSection
ExitProcess
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
CoInitialize
CoUninitialize
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
memset
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
_wcslwr
wcsstr
_access
strstr
strcpy
strlen
strncmp
strchr
??3@YAXPAX@Z
memcpy
_purecall
??2@YAPAXI@Z
memcmp
sprintf
strcmp
strrchr
fclose
fread
_strlwr
ftell
fseek
fopen
strcat
strncpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ