?hookproc@@YGJHIJ@Z
installhook
removehook
Static task
static1
Behavioral task
behavioral1
Sample
ecab1c599955d590f5dd39beea4fc7fff603344f50e177cc9b836e651a7ece6f.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecab1c599955d590f5dd39beea4fc7fff603344f50e177cc9b836e651a7ece6f.dll
Resource
win10v2004-20240802-en
Target
ecab1c599955d590f5dd39beea4fc7fff603344f50e177cc9b836e651a7ece6f
Size
408KB
MD5
8b3e1e41812580de62e3d388f4b2a24c
SHA1
a924584a93dc363c7e7ed84fba6dd4ee99e7b13b
SHA256
ecab1c599955d590f5dd39beea4fc7fff603344f50e177cc9b836e651a7ece6f
SHA512
fdd4560c394e962d95b248f55712962b0af3260b876995f1f1305a4484ed63a3f082e09af1ebe49f73e09f8ff4d6d8db7c201c141db8019b098c32a9e51d96c9
SSDEEP
1536:82uBSo+JcznjT8Dp0yOTOzOod8bHo5EVD3F:QwmzSDzOodqKuDV
Checks for missing Authenticode signature.
resource |
---|
ecab1c599955d590f5dd39beea4fc7fff603344f50e177cc9b836e651a7ece6f |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
ReadFile
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
CloseHandle
WriteFile
InitializeCriticalSection
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
DeleteCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
UnhookWindowsHookEx
wsprintfA
SetWindowsHookExA
?hookproc@@YGJHIJ@Z
installhook
removehook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ