CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abbcdef@16
abbcdef
Static task
static1
Behavioral task
behavioral1
Sample
e9c27dc5b618fc4f912444d72071dc1f08f00f0c33062665db70c700fc0a7519.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9c27dc5b618fc4f912444d72071dc1f08f00f0c33062665db70c700fc0a7519.dll
Resource
win10v2004-20221111-en
Target
e9c27dc5b618fc4f912444d72071dc1f08f00f0c33062665db70c700fc0a7519
Size
37KB
MD5
4a9e5b232a192f0113ced9cf73878670
SHA1
720ed2beb269808691813d0164eafeb66349ff39
SHA256
e9c27dc5b618fc4f912444d72071dc1f08f00f0c33062665db70c700fc0a7519
SHA512
ade40688357f34b05fedb8b223bbb59b52eb0d746cf2fcdfb43feb6dce608acdf3c1430e366a15164bd9e46f31c769627dd2f656cf395bd5581b15509dc992ad
SSDEEP
384:ZApFVX9lqxfctUiuyBERn95KIqF0MTfuR4sPD8ogp:ZAPVtQxf2Uiuy6X5Xq9mKK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
LoadResource
SizeofResource
GetModuleHandleA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
WaitForSingleObject
MultiByteToWideChar
SetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
GetFileTime
LoadLibraryA
GetProcAddress
FindFirstFileA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
PathFileExistsA
StrStrIA
strcat
strcpy
strstr
strncat
strlen
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abbcdef@16
abbcdef
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ