DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Static task
static1
Behavioral task
behavioral1
Sample
6CA1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6CA1.dll
Resource
win10v2004-20240802-en
Target
6CA1.dll
Size
48KB
MD5
eee5275690d89a686bf8339894f9f8a2
SHA1
1170c16bba434c73a350499d9ae7a57f3f083127
SHA256
04bd13799c62509c5c0b3e3496f22ba020fbd67a15a194942ca2f5477834c179
SHA512
6aeb6f4e0b7b787c38e1f49cd67100cc548a7f6e8e5168eb150adce9b7aa05f97b6d7337983d8d936f72ff3f3fc4c2ba0527152961a0fdd8feae9fb382fb06ef
SSDEEP
768:z9B+xqT1yItW+fxYHyaMKx5vk4U3MD8lWLwVNbblTOVewAH33i3:zv+xSztHZYSjjh3M4+wzHlCcwAH3M
Checks for missing Authenticode signature.
resource |
---|
6CA1.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
CloseHandle
CreateFileW
CreateMutexW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExpandEnvironmentStringsW
GetComputerNameExW
GetComputerNameW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTickCount
GetVolumeInformationW
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenMutexW
PeekNamedPipe
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetCurrentDirectoryW
SetFilePointer
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
__iob_func
_amsg_exit
_initterm
_lock
_unlock
_vsnwprintf
_wcsnicmp
abort
calloc
free
fwrite
rand
realloc
signal
srand
strcat
strcpy
strlen
strncmp
vfprintf
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
CoTaskMemFree
SHGetFolderPathW
WSACleanup
WSAStartup
gethostbyname
gethostname
inet_ntoa
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ