OffHookPCTW
OnHookPCTW
Static task
static1
Behavioral task
behavioral1
Sample
f334d2871fb68949d8d315ffd1e246c255a49bb1f852e9b4a0d23705e1e59b2e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f334d2871fb68949d8d315ffd1e246c255a49bb1f852e9b4a0d23705e1e59b2e.dll
Resource
win10v2004-20240802-en
Target
f334d2871fb68949d8d315ffd1e246c255a49bb1f852e9b4a0d23705e1e59b2e
Size
664KB
MD5
4842ea129a601444d1e2e1d9fbdc8d33
SHA1
b387228f1aa218d6e2371fcd863fa335151a1c5e
SHA256
f334d2871fb68949d8d315ffd1e246c255a49bb1f852e9b4a0d23705e1e59b2e
SHA512
ae66d6895e37f40872bb830a9ea99c10eba07b78018e5d1d002d7ee08568fa6ba7f3eb232ab7264349c93b7aeab829fae9f739323c2a2e15c8c11afa1620f681
SSDEEP
12288:mqbR38M9x8bBoJsRheyvLT7X3v5khBY5x2JBNxRB3v3HnHCXaHZQa7/2wFTzUxZ0:mqbR38M9MwJ1xWO/MIiqwItGK52mYM8g
Checks for missing Authenticode signature.
resource |
---|
f334d2871fb68949d8d315ffd1e246c255a49bb1f852e9b4a0d23705e1e59b2e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameExA
EnumProcessModules
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
send
WSAGetLastError
inet_addr
connect
gethostname
gethostbyname
closesocket
htonl
bind
WSAAsyncSelect
listen
socket
WSACleanup
WSAStartup
recv
accept
inet_ntoa
getpeername
htons
DeleteFileA
GetLastError
InitializeCriticalSection
EnterCriticalSection
GetCurrentThread
GetCurrentDirectoryA
Thread32First
TerminateThread
Thread32Next
GetComputerNameA
CreateFileMappingA
MapViewOfFile
FreeLibrary
SetPriorityClass
LoadLibraryA
GetProcAddress
LeaveCriticalSection
GetTickCount
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
LocalFree
LocalAlloc
WideCharToMultiByte
WritePrivateProfileStringA
GetCurrentProcess
MultiByteToWideChar
CloseHandle
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
OpenProcess
GetCurrentProcessId
Process32Next
GetBinaryTypeA
Module32First
TerminateProcess
GetPriorityClass
Process32First
CreateToolhelp32Snapshot
WriteProcessMemory
DeleteCriticalSection
GetClientRect
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
wsprintfA
ClientToScreen
GetSystemMetrics
SendInput
SetCursorPos
MapVirtualKeyA
ScreenToClient
UnhookWindowsHookEx
SetWindowsHookExA
GetParent
GetAsyncKeyState
SetTimer
SetWindowLongA
GetDC
ReleaseDC
DestroyWindow
GetFocus
GetCursorPos
keybd_event
RegisterClassExA
CreateWindowExA
UpdateWindow
ShowWindow
EnumWindows
GetDlgCtrlID
SendMessageA
EnumChildWindows
FindWindowExA
GetWindowTextA
CallWindowProcA
GetForegroundWindow
GetWindowLongA
SendDlgItemMessageA
IsDlgButtonChecked
CheckDlgButton
SetWindowPos
SetFocus
SetForegroundWindow
CreatePopupMenu
InsertMenuA
GetDlgItem
GetWindowRect
TrackPopupMenu
DestroyMenu
CallNextHookEx
SetTextColor
PatBlt
SetBkColor
GetTextColor
TextOutA
GetPixel
CreateSolidBrush
SetPixel
BitBlt
_mbscpy
fread
fseek
ftell
fputc
fwrite
_ftol
atol
_beginthreadex
_mkdir
srand
_mbschr
malloc
free
time
localtime
fprintf
_strnicmp
_strupr
fopen
fgets
fclose
_mbscmp
_stricmp
rand
_itoa
strchr
_ismbblead
strtok
_except_handler3
??2@YAPAXI@Z
abs
atoi
memcpy
strncpy
_mbsstr
__CxxFrameHandler
strstr
_mbstok
_mbsncmp
isalpha
strlen
strcat
isdigit
strcpy
_mbscat
strrchr
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
memset
strcmp
??3@YAXPAX@Z
sprintf
strncmp
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
OffHookPCTW
OnHookPCTW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ