DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b3448671b078cd6223384850e680451ab257f7a2bb1ffbfba4a760d79e868af6.dll
Resource
win7-20240903-en
Target
b3448671b078cd6223384850e680451ab257f7a2bb1ffbfba4a760d79e868af6.exe
Size
308KB
MD5
e4577c711455ccfd4ec4c0a02d23340f
SHA1
b0f4b0c36ec324246d3b815ee94f5e2e9f8102f4
SHA256
b3448671b078cd6223384850e680451ab257f7a2bb1ffbfba4a760d79e868af6
SHA512
8266f05cd3f261554a5fd70e5434279ed690454e4dd473ab7f8a02f058450f753cf6366db35bced2e263e2d5054fd820f7aff672add862d688b9ef0dd19cf5d3
SSDEEP
6144:e6QlFKuIXrznO2I0Xrp55ttpbYa06T/60nGAkPj2sK+C2pcZ70b/9p91H1nsm7Po:eVTAHvVe9P1od
Checks for missing Authenticode signature.
resource |
---|
b3448671b078cd6223384850e680451ab257f7a2bb1ffbfba4a760d79e868af6.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PropertySheetA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
SetEnvironmentVariableA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
lstrcpyA
FreeEnvironmentStringsA
IsDBCSLeadByte
lstrcmpiA
TerminateProcess
SetEndOfFile
GetStartupInfoA
GetStdHandle
SetHandleCount
SetStdHandle
GetProcAddress
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
IsBadWritePtr
VirtualAlloc
ExitProcess
VirtualFree
HeapCreate
GetVersion
GetCommandLineA
HeapReAlloc
GetLocalTime
GetSystemTime
GetTimeZoneInformation
CreateFileA
GetFileType
SetFilePointer
CloseHandle
ReadFile
RtlUnwind
HeapAlloc
HeapFree
FindFirstFileA
FindNextFileA
GetLastError
FindClose
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
WideCharToMultiByte
lstrlenW
lstrlenA
lstrcpynA
lstrcmpA
MultiByteToWideChar
GetCurrentDirectoryA
SetCurrentDirectoryA
FreeLibrary
GetCurrentProcess
FlushInstructionCache
LoadLibraryA
FreeEnvironmentStringsW
SHGetMalloc
SHGetFolderPathA
SHBrowseForFolderA
SHGetPathFromIDListA
GdipDeleteBrush
GdipCreateBitmapFromFileICM
GdipGetImageWidth
GdipGetImageHeight
GdipSetInterpolationMode
GdipDrawImageRectRectI
GdipDrawImageI
GdiplusShutdown
GdipDisposeImage
GdipCloneImage
GdipCloneBrush
GdiplusStartup
GdipAlloc
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdipFillRectangleI
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipDeleteGraphics
GdipFree
DirectDrawCreate
timeGetTime
IsDlgButtonChecked
EndDialog
LoadStringA
wsprintfW
CharNextA
GetWindowRect
DialogBoxParamA
GetForegroundWindow
GetDesktopWindow
CallWindowProcA
UnhookWindowsHookEx
DestroyWindow
PostMessageA
SetCursor
LoadCursorA
RegisterClassA
GetSystemMetrics
CreateWindowExA
IsWindowUnicode
SetWindowsHookExA
UpdateWindow
DefWindowProcA
GetAsyncKeyState
CallNextHookEx
GetFocus
GetWindowLongA
wsprintfA
GetDlgItem
RegisterWindowMessageA
GetClientRect
GetDC
ReleaseDC
SetWindowLongA
SendMessageA
ShowWindow
CheckDlgButton
SetTextColor
SetTextAlign
TextOutA
StretchDIBits
GetDeviceCaps
SetBkColor
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
CreateDIBitmap
ChooseColorA
RegCreateKeyExA
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
SysAllocString
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE