DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
dzip30.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
DzipGui.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
DzipGui.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
DzipShlx.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
dzip.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
dzip.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
dzip_dz.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
dzip_pak.dll
Resource
win11-20241007-en
Target
dzip30.zip
Size
173KB
MD5
098eaf8dd4df5b7bf58b827d2748c7a5
SHA1
0a33f1f9af8fa197918ee75ddcba07db9da5114f
SHA256
3f3ba3af1c7b30157b1bf786cde959617c3776fd09f37959c8f00e9faa09a9de
SHA512
65a4d77e52a1ecd10d14b97ed60bb4705e8bfd288fb0d0f24fb42642b6a0136d96d7d07a79d5c327e7896fb11693f5d7d2fe19a3d40f8557a9dee26f6d2a1df7
SSDEEP
3072:H43C837E3QLIx/zJwkQib4Q12IgxCy3E6UFV9hR2l7jjQc74eUo9o9q93mr4m:Y3C837i3xqa12VCZ6U/9HbeJ9Aq93g
Checks for missing Authenticode signature.
resource |
---|
unpack001/DzipGui.exe |
unpack001/DzipShlx.dll |
unpack001/dzip.exe |
unpack001/dzip_dz.dll |
unpack001/dzip_pak.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateToolbarEx
ImageList_Add
ord6
ImageList_GetIcon
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
ord17
FreeLibrary
GetModuleFileNameA
GetProcAddress
LoadLibraryA
LocalFileTimeToFileTime
SetFileTime
WriteFile
GetTempPathA
Sleep
GlobalAlloc
GetFileSize
SetEndOfFile
MoveFileA
GetModuleHandleA
CompareStringA
GetNumberFormatA
GetCurrentThreadId
RemoveDirectoryA
TerminateThread
GetVersion
GetWindowsDirectoryA
GetShortPathNameA
MoveFileExA
LoadResource
FindResourceA
SetUnhandledExceptionFilter
SetErrorMode
SuspendThread
ResumeThread
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FormatMessageA
DosDateTimeToFileTime
LocalFree
GetLastError
GetFileAttributesA
CreateDirectoryA
LCMapStringA
FileTimeToDosDateTime
CloseHandle
DeleteFileA
SetFilePointer
ReadFile
GetFullPathNameA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
CreateFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateThread
GetModuleHandleW
SystemParametersInfoA
AttachThreadInput
RegisterClipboardFormatA
GetWindowTextA
SetTimer
KillTimer
PeekMessageA
PostMessageA
MsgWaitForMultipleObjects
GetMenuState
DestroyMenu
TrackPopupMenuEx
GetCaretPos
DestroyIcon
RegisterClassA
CreateAcceleratorTableA
DestroyAcceleratorTable
LoadBitmapA
TranslateMessage
DispatchMessageA
DefWindowProcA
TranslateAcceleratorA
SetCursor
LoadCursorA
FillRect
SetMenu
LoadImageA
GetClientRect
InvalidateRgn
CheckMenuItem
DestroyWindow
CreateWindowExA
LoadStringA
EnableWindow
IsDlgButtonChecked
CheckDlgButton
SetDlgItemTextA
GetSysColor
DrawStateA
DrawTextA
SetMenuItemInfoA
DeleteMenu
AppendMenuA
GetMenuItemCount
EnableMenuItem
CreatePopupMenu
GetMessageA
CreateMenu
SendMessageA
CallWindowProcA
SetForegroundWindow
SetWindowLongA
LoadIconA
EnumWindows
GetClassWord
MessageBeep
MessageBoxA
GetWindowRect
SetWindowTextA
ReleaseDC
GetDC
SendDlgItemMessageA
GetDlgItemTextA
GetDlgItem
EndDialog
GetParent
ShowWindow
MoveWindow
GetWindowPlacement
DialogBoxParamA
SetFocus
StretchDIBits
CreateCompatibleBitmap
SetTextColor
SetBkColor
SelectObject
CreateFontIndirectA
GetTextExtentPoint32A
DeleteObject
CreateFontA
CreateCompatibleDC
GetDeviceCaps
SHGetSpecialFolderLocation
DragAcceptFiles
SHGetFileInfoA
SHChangeNotify
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
DragFinish
DragQueryFileA
ShellExecuteA
OleInitialize
OleUninitialize
DoDragDrop
GetSaveFileNameA
GetOpenFileNameA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
_except_handler4_common
__current_exception_context
__current_exception
strchr
strstr
memset
memcpy
strrchr
_set_fmode
__stdio_common_vsscanf
__stdio_common_vsprintf
__p__commode
_set_new_mode
calloc
free
realloc
malloc
_strnicmp
_stricmp
strpbrk
_strdup
qsort
_exit
_initterm_e
_cexit
_c_exit
_get_narrow_winmain_command_line
_initialize_narrow_environment
_set_app_type
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_initterm
_controlfp_s
terminate
_configure_narrow_argv
_seh_filter_exe
exit
_register_thread_local_exe_atexit_callback
__setusermatherr
_configthreadlocale
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_stricmp
_strdup
strncpy
malloc
_callnewh
realloc
free
_CxxThrowException
strrchr
__std_exception_destroy
__std_exception_copy
SetUnhandledExceptionFilter
GetCurrentProcess
FindClose
FindFirstFileA
TerminateProcess
CreateProcessA
FreeLibrary
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GlobalFree
lstrlenA
lstrlenW
UnhandledExceptionFilter
FindNextFileA
IsProcessorFeaturePresent
wsprintfA
InsertMenuA
LoadBitmapA
SetMenuItemBitmaps
DeleteObject
DragQueryFileA
SHGetPathFromIDListA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
SetEndOfFile
FileTimeToDosDateTime
CreateDirectoryA
CreateFileA
LocalFileTimeToFileTime
SetFileTime
CloseHandle
DosDateTimeToFileTime
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
__current_exception
memcpy
memmove
memset
strchr
_except_handler4_common
__current_exception_context
fread
fseek
ftell
fopen
fclose
fwrite
__stdio_common_vsprintf
__p__commode
_get_osfhandle
fflush
__acrt_iob_func
__stdio_common_vfprintf
_set_fmode
_fileno
malloc
calloc
free
realloc
_set_new_mode
remove
_errno
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_set_app_type
exit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
strerror
_exit
_seh_filter_exe
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_controlfp_s
terminate
_configure_narrow_argv
strncpy
strpbrk
_stricmp
_strdup
qsort
__setusermatherr
_configthreadlocale
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
free
__acrt_iob_func
memset
_stricmp
memcpy
memmove
strchr
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDllFuncs
GetExtensions
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
free
memset
GetDllFuncs
GetExtensions
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ