Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
dbfe80410addf82a2049799eb4f701a09eea04359499ff6580aba4b71b002821.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbfe80410addf82a2049799eb4f701a09eea04359499ff6580aba4b71b002821.dll
Resource
win10v2004-20241007-en
Target
dbfe80410addf82a2049799eb4f701a09eea04359499ff6580aba4b71b002821
Size
13KB
MD5
4d3ecd0b9e0757da0409709c4e5912a3
SHA1
0304f75d83acfe25e6b83f6bb474090354d1dd28
SHA256
dbfe80410addf82a2049799eb4f701a09eea04359499ff6580aba4b71b002821
SHA512
f5891d52e180a66870a46f1b5327cc8654b0288f62428c95c2239777ec23605a2fb7cb78addc7f0025871ea67745c584d8a203a036ade3f92739db2625d3cbdc
SSDEEP
192:amRZIhcvo0lbFnqCxDlpzxuJ85kWg+dL+d3EXrPK3BRwi/2BM3:RzNvo6sCJlpzxuz+drjCci/2BM3
Checks for missing Authenticode signature.
resource |
---|
dbfe80410addf82a2049799eb4f701a09eea04359499ff6580aba4b71b002821 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
VirtualProtect
Sleep
lstrcmpA
lstrcatA
lstrcmpiA
lstrcpyA
ExitProcess
lstrlenA
GetTickCount
lstrcpynA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WritePrivateProfileStringA
GetTempPathA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ