OffHookPCTW
OnHookPCTW
Static task
static1
Behavioral task
behavioral1
Sample
815b260e4362c5b725a52f9871590ce18a5b874a12ad556df8a493c0d59de5a0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
815b260e4362c5b725a52f9871590ce18a5b874a12ad556df8a493c0d59de5a0.dll
Resource
win10v2004-20240802-en
Target
815b260e4362c5b725a52f9871590ce18a5b874a12ad556df8a493c0d59de5a0
Size
664KB
MD5
f0fb804d501819b115adcfe9fdc80e40
SHA1
b52ab393edfe0a8175f6fc02eb77290270ac764f
SHA256
815b260e4362c5b725a52f9871590ce18a5b874a12ad556df8a493c0d59de5a0
SHA512
a972ccc2bca3c84cd765dd63136cf9e89cd736894f2d5b638f161cfa7365b8b830be22f2d3ae8630ef852071719841d33566f81cce4fca1dd05edd45c8b02727
SSDEEP
12288:SjsWCz8IeOiujrtjdBguM+sreeJQcIA+wIt5rD0m6JvOBMR30z+vG:WsWCz8IeOLKreeecIA+wIt5rD0m6Jv4i
Checks for missing Authenticode signature.
resource |
---|
815b260e4362c5b725a52f9871590ce18a5b874a12ad556df8a493c0d59de5a0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameExA
EnumProcessModules
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
send
WSAGetLastError
inet_addr
connect
gethostname
gethostbyname
closesocket
htonl
bind
WSAAsyncSelect
listen
socket
WSACleanup
WSAStartup
recv
accept
inet_ntoa
getpeername
htons
DeleteFileA
GetLastError
InitializeCriticalSection
EnterCriticalSection
GetCurrentThread
GetCurrentDirectoryA
Thread32First
TerminateThread
Thread32Next
GetComputerNameA
CreateFileMappingA
MapViewOfFile
FreeLibrary
SetPriorityClass
CreateToolhelp32Snapshot
Process32First
LeaveCriticalSection
GetTickCount
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
LocalFree
LocalAlloc
WideCharToMultiByte
GetProcAddress
LoadLibraryA
WriteProcessMemory
WritePrivateProfileStringA
GetCurrentProcess
MultiByteToWideChar
CloseHandle
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
OpenProcess
GetCurrentProcessId
Process32Next
GetBinaryTypeA
Module32First
TerminateProcess
GetPriorityClass
DeleteCriticalSection
GetClientRect
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
wsprintfA
ClientToScreen
GetSystemMetrics
SendInput
SetCursorPos
MapVirtualKeyA
ScreenToClient
UnhookWindowsHookEx
SetWindowsHookExA
GetParent
GetAsyncKeyState
SetTimer
SetWindowLongA
GetDC
ReleaseDC
DestroyWindow
GetFocus
GetCursorPos
keybd_event
RegisterClassExA
UpdateWindow
ShowWindow
CreateWindowExA
EnumWindows
GetDlgCtrlID
SendMessageA
EnumChildWindows
FindWindowExA
GetWindowTextA
CallWindowProcA
GetForegroundWindow
GetWindowLongA
SendDlgItemMessageA
IsDlgButtonChecked
CheckDlgButton
SetWindowPos
SetFocus
SetForegroundWindow
CreatePopupMenu
InsertMenuA
GetDlgItem
GetWindowRect
TrackPopupMenu
DestroyMenu
CallNextHookEx
SetTextColor
PatBlt
SetBkColor
GetTextColor
TextOutA
GetPixel
CreateSolidBrush
SetPixel
BitBlt
_mbscpy
fread
fseek
ftell
fputc
fwrite
_ftol
atol
_beginthreadex
_mkdir
srand
_mbschr
malloc
free
time
localtime
fprintf
_strnicmp
_strupr
fopen
fgets
fclose
_mbscmp
_stricmp
rand
_itoa
strchr
_ismbblead
strtok
_except_handler3
??2@YAPAXI@Z
abs
atoi
memcpy
strncpy
_mbsstr
__CxxFrameHandler
strstr
_mbstok
_mbsncmp
isalpha
strlen
strcat
isdigit
strcpy
_mbscat
strrchr
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
memset
strcmp
??3@YAXPAX@Z
sprintf
strncmp
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
OffHookPCTW
OnHookPCTW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ