CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
Static task
static1
Behavioral task
behavioral1
Sample
1fac5516fe0ea5f0dce16b32dc399d2df4f10a906bffbf0fb131879305216497.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1fac5516fe0ea5f0dce16b32dc399d2df4f10a906bffbf0fb131879305216497.dll
Resource
win10v2004-20221111-en
Target
1fac5516fe0ea5f0dce16b32dc399d2df4f10a906bffbf0fb131879305216497
Size
112KB
MD5
fe459d1c0463a35d26eea72ba7bffc70
SHA1
c1f493ec38e5f906028599c2e360e88abfcf5140
SHA256
1fac5516fe0ea5f0dce16b32dc399d2df4f10a906bffbf0fb131879305216497
SHA512
77d59ec6ca70ada2a698c56ae43c0f84a3f4a2e64a807ec3593acdad2a6c830559fcb20a4ded70585be9a4d31319057e2265b41575d841f7fd20a5294768d3cc
SSDEEP
3072:Hb4UgfQVqGkZbGvjzh9jPrBJegyxJLmdXPdQl:74UkQV9kBGvjMeQl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
LoadResource
SizeofResource
GetModuleHandleA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
WaitForSingleObject
MultiByteToWideChar
SetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
GetFileTime
LoadLibraryA
GetProcAddress
FindFirstFileA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
PathFileExistsA
StrStrIA
strcat
strcpy
strstr
strncat
strlen
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ