OffHookPCTW
OnHookPCTW
Static task
static1
Behavioral task
behavioral1
Sample
eaeee48e00e22501e4af816713cbad4cf53edd58112993eac7d9df4d9f1bb3b4.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaeee48e00e22501e4af816713cbad4cf53edd58112993eac7d9df4d9f1bb3b4.dll
Resource
win10v2004-20240802-en
Target
eaeee48e00e22501e4af816713cbad4cf53edd58112993eac7d9df4d9f1bb3b4
Size
668KB
MD5
e457d9c898f88d2cb2a65a1df59c9108
SHA1
2eaac669149ef30047747dd035550e26004b0c46
SHA256
eaeee48e00e22501e4af816713cbad4cf53edd58112993eac7d9df4d9f1bb3b4
SHA512
a9f7f0fd1a79b42af6e176ef44fbe6b42ba08b7400bbb14a4c3bc7204bbe6e9c2e57bcf58ef413b91f5b66a22da8cbc8844568c97164b70340e61c8a61938417
SSDEEP
12288:Sb+v10McfH0ArSGrJHEnpuWdTOXLkt+p20gyw4xVF+zAhmqpcDj9MI/L:Sb810McfH0ATrJtXWE20gyw4xVF6Ahm9
Checks for missing Authenticode signature.
resource |
---|
eaeee48e00e22501e4af816713cbad4cf53edd58112993eac7d9df4d9f1bb3b4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameExA
EnumProcessModules
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
send
WSAGetLastError
inet_addr
connect
gethostname
gethostbyname
closesocket
htonl
bind
WSAAsyncSelect
listen
socket
WSACleanup
WSAStartup
recv
accept
inet_ntoa
getpeername
htons
DeleteFileA
GetLastError
InitializeCriticalSection
EnterCriticalSection
GetCurrentThread
WriteProcessMemory
GetCurrentDirectoryA
Thread32First
TerminateThread
Thread32Next
GetComputerNameA
CreateFileMappingA
MapViewOfFile
LoadLibraryA
GetProcAddress
FreeLibrary
LeaveCriticalSection
GetTickCount
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
LocalFree
LocalAlloc
WideCharToMultiByte
WritePrivateProfileStringA
GetCurrentProcess
MultiByteToWideChar
CloseHandle
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
OpenProcess
GetCurrentProcessId
Process32Next
GetBinaryTypeA
Module32First
TerminateProcess
GetPriorityClass
Process32First
CreateToolhelp32Snapshot
SetPriorityClass
DeleteCriticalSection
GetClientRect
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
wsprintfA
ClientToScreen
GetSystemMetrics
SendInput
SetCursorPos
MapVirtualKeyA
ScreenToClient
UnhookWindowsHookEx
SetWindowsHookExA
GetParent
GetAsyncKeyState
SetTimer
SetWindowLongA
GetDC
ReleaseDC
DestroyWindow
GetFocus
GetCursorPos
keybd_event
RegisterClassExA
CreateWindowExA
UpdateWindow
ShowWindow
EnumWindows
GetDlgCtrlID
SendMessageA
EnumChildWindows
FindWindowExA
GetWindowTextA
CallWindowProcA
GetForegroundWindow
GetWindowLongA
SendDlgItemMessageA
IsDlgButtonChecked
CheckDlgButton
SetWindowPos
SetFocus
SetForegroundWindow
CreatePopupMenu
InsertMenuA
GetDlgItem
GetWindowRect
TrackPopupMenu
DestroyMenu
CallNextHookEx
SetTextColor
PatBlt
SetBkColor
GetTextColor
TextOutA
GetPixel
CreateSolidBrush
SetPixel
BitBlt
_mbscpy
fread
fseek
ftell
fputc
fwrite
_ftol
atol
_beginthreadex
_mkdir
srand
_mbschr
malloc
free
time
localtime
fprintf
_strnicmp
_strupr
fopen
fgets
fclose
_mbscmp
_stricmp
rand
_itoa
strchr
_ismbblead
strtok
_except_handler3
??2@YAPAXI@Z
abs
atoi
memcpy
strncpy
_mbsstr
__CxxFrameHandler
strstr
_mbstok
_mbsncmp
isalpha
strlen
strcat
isdigit
strcpy
_mbscat
strrchr
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
memset
strcmp
??3@YAXPAX@Z
sprintf
strncmp
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
OffHookPCTW
OnHookPCTW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ