?hookproc@@YGJHIJ@Z
installhook
removehook
Static task
static1
Behavioral task
behavioral1
Sample
9af6ebb3b32ddd94a64d5f9a248cc1e8ad79506cfbfb7a28eb1eab18fb790c8f.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9af6ebb3b32ddd94a64d5f9a248cc1e8ad79506cfbfb7a28eb1eab18fb790c8f.dll
Resource
win10v2004-20240802-en
Target
9af6ebb3b32ddd94a64d5f9a248cc1e8ad79506cfbfb7a28eb1eab18fb790c8f
Size
408KB
MD5
8e1cb12ba561f66965fab73dd5427253
SHA1
a04de2bb5d8ba4401bec3a97d5596c8f2cf90bf2
SHA256
9af6ebb3b32ddd94a64d5f9a248cc1e8ad79506cfbfb7a28eb1eab18fb790c8f
SHA512
3fe6be75077f145f69b2adc6cf4bc1de500c640bccbc31465e91f9e5c3ff13926a15a4d650ecdecc9055c876681421973a21fc92e5979fd103cfb54088430f08
SSDEEP
1536:r7zuBSTS+Jk9njT8D91/0yEtIzOod8bHo5EVD3F5S:Csxy9c19YIzOodqKuDV
Checks for missing Authenticode signature.
resource |
---|
9af6ebb3b32ddd94a64d5f9a248cc1e8ad79506cfbfb7a28eb1eab18fb790c8f |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
ReadFile
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
CloseHandle
WriteFile
InitializeCriticalSection
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
DeleteCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
UnhookWindowsHookEx
wsprintfA
SetWindowsHookExA
?hookproc@@YGJHIJ@Z
installhook
removehook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ