DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7cac403b4418a5a1d5c21803754953a701e237334db6a8ef07a0820bb41e145eN.dll
Resource
win7-20241010-en
Target
7cac403b4418a5a1d5c21803754953a701e237334db6a8ef07a0820bb41e145eN.exe
Size
308KB
MD5
4efa2a73fcd2b531bb3fedc837c57b60
SHA1
3bcb3dcfd64f927b77fa72f7b476885ca4b9df4b
SHA256
7cac403b4418a5a1d5c21803754953a701e237334db6a8ef07a0820bb41e145e
SHA512
d0452b58444203bba97d84f1a17154252ea606efdeaa6f48970ba9bdbcbdbac21ba17a674e777eb16a3efe37a6e400dca7145bcc424bdd5e586d0d0e9cf9a347
SSDEEP
6144:e6QlFKuIXrznO2I0Xrp55ttpbYa06T/60nGAkPj2sK+C2pcZ70b/9p91H1nsm7PY:eVTAHvVe9P1o
Checks for missing Authenticode signature.
resource |
---|
7cac403b4418a5a1d5c21803754953a701e237334db6a8ef07a0820bb41e145eN.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PropertySheetA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
SetEnvironmentVariableA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
lstrcpyA
FreeEnvironmentStringsA
IsDBCSLeadByte
lstrcmpiA
TerminateProcess
SetEndOfFile
GetStartupInfoA
GetStdHandle
SetHandleCount
SetStdHandle
GetProcAddress
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
IsBadWritePtr
VirtualAlloc
ExitProcess
VirtualFree
HeapCreate
GetVersion
GetCommandLineA
HeapReAlloc
GetLocalTime
GetSystemTime
GetTimeZoneInformation
CreateFileA
GetFileType
SetFilePointer
CloseHandle
ReadFile
RtlUnwind
HeapAlloc
HeapFree
FindFirstFileA
FindNextFileA
GetLastError
FindClose
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
WideCharToMultiByte
lstrlenW
lstrlenA
lstrcpynA
lstrcmpA
MultiByteToWideChar
GetCurrentDirectoryA
SetCurrentDirectoryA
FreeLibrary
GetCurrentProcess
FlushInstructionCache
LoadLibraryA
FreeEnvironmentStringsW
SHGetMalloc
SHGetFolderPathA
SHBrowseForFolderA
SHGetPathFromIDListA
GdipDeleteBrush
GdipCreateBitmapFromFileICM
GdipGetImageWidth
GdipGetImageHeight
GdipSetInterpolationMode
GdipDrawImageRectRectI
GdipDrawImageI
GdiplusShutdown
GdipDisposeImage
GdipCloneImage
GdipCloneBrush
GdiplusStartup
GdipAlloc
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdipFillRectangleI
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipDeleteGraphics
GdipFree
DirectDrawCreate
timeGetTime
IsDlgButtonChecked
EndDialog
LoadStringA
wsprintfW
CharNextA
GetWindowRect
DialogBoxParamA
GetForegroundWindow
GetDesktopWindow
CallWindowProcA
UnhookWindowsHookEx
DestroyWindow
PostMessageA
SetCursor
LoadCursorA
RegisterClassA
GetSystemMetrics
CreateWindowExA
IsWindowUnicode
SetWindowsHookExA
UpdateWindow
DefWindowProcA
GetAsyncKeyState
CallNextHookEx
GetFocus
GetWindowLongA
wsprintfA
GetDlgItem
RegisterWindowMessageA
GetClientRect
GetDC
ReleaseDC
SetWindowLongA
SendMessageA
ShowWindow
CheckDlgButton
SetTextColor
SetTextAlign
TextOutA
StretchDIBits
GetDeviceCaps
SetBkColor
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
CreateDIBitmap
ChooseColorA
RegCreateKeyExA
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
SysAllocString
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE