Rathbuige
ServiceMain
SvchostPushServiceGlobals
Static task
static1
Behavioral task
behavioral1
Sample
55e4d509de5b0f1ea888ff87eb0d190c328a559d7cc5653c46947e57c0f01ec5.zip
Resource
win10-20230220-en
Target
55e4d509de5b0f1ea888ff87eb0d190c328a559d7cc5653c46947e57c0f01ec5.zip
Size
46KB
MD5
0ce18607ac48349e6c85ad033a2b64e6
SHA1
fc0bf6496e1c714b6eb8e92c9599355963fd9e34
SHA256
3fe5b2752d5f8d73b6beadbc2ceaf77e8c18a76cdd82ff355be32fa63d7a02e8
SHA512
28c2232cff24849d26f84a4b0db7db694d73f377538c58a8ebed864498ab5802a71cb1f20d89bd6a318e4882628d59a8929e46cf30fcd18cf720d84617a4341f
SSDEEP
768:y/9iaQTzjvI8oZSls+T7BZxKHWmNDulX0GuyY12+lBAoLHv/D+KrvFdHQzZEqCUI:gihvjXoklXTVzKHW/XuyY11HzprvFdHT
Checks for missing Authenticode signature.
resource |
---|
unpack001/55e4d509de5b0f1ea888ff87eb0d190c328a559d7cc5653c46947e57c0f01ec5.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtClose
RtlAdjustPrivilege
NtSetInformationThread
ZwDuplicateToken
NtOpenProcessToken
NtTerminateThread
NtOpenProcess
lstrlenA
OpenProcess
TerminateProcess
ReadFile
CreateFileW
Process32FirstW
Process32NextW
lstrcmpiW
CreateToolhelp32Snapshot
LocalFree
GetCurrentProcess
WaitForSingleObject
FindFirstFileW
FindVolumeClose
GetDriveTypeW
GetLogicalDriveStringsW
SetVolumeMountPointW
WriteFile
GlobalAlloc
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
GetFileAttributesW
lstrcmpW
MoveFileW
GlobalFree
FindClose
LocalAlloc
GetExitCodeThread
PostQueuedCompletionStatus
DeviceIoControl
WaitForMultipleObjects
CloseHandle
GetWindowsDirectoryW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
ResumeThread
SetFileAttributesW
CreateThread
HeapDestroy
GetComputerNameW
GetLogicalDrives
GetDiskFreeSpaceExW
GetVolumeInformationW
lstrcmpA
SetFilePointerEx
CreateIoCompletionPort
ExitProcess
CreateFileA
VirtualQuery
CreateProcessW
LoadLibraryW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
CreateProcessA
lstrcatA
GetShortPathNameA
GetProcAddress
GetModuleFileNameA
GetCurrentThreadId
lstrcpyA
QueryFullProcessImageNameW
UnhandledExceptionFilter
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetSystemTimeAsFileTime
lstrcatW
GetSystemInfo
GlobalMemoryStatusEx
GetLastError
OpenMutexW
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
HeapCreate
Sleep
WideCharToMultiByte
GetProcessHeap
HeapFree
HeapAlloc
GetNativeSystemInfo
CreateMutexW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetQueuedCompletionStatus
lstrcpyW
SetUnhandledExceptionFilter
FindNextFileW
GetCommandLineW
wsprintfW
GetKeyboardLayoutList
wsprintfA
ExitWindowsEx
GetSystemMetrics
GetForegroundWindow
RegOpenKeyExW
RegCreateKeyExW
CryptGenRandom
CryptAcquireContextW
GetUserNameW
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EnumServicesStatusExW
ControlService
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegCloseKey
RegSetValueExW
DeleteService
RegQueryValueExW
ShellExecuteExW
CommandLineToArgvW
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
SysFreeString
VariantInit
VariantClear
SysAllocString
??1type_info@@UEAA@XZ
_XcptFilter
_initterm
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_CxxThrowException
__CxxFrameHandler3
isdigit
malloc
calloc
free
??2@YAPEAX_K@Z
??3@YAXPEAX@Z
??_V@YAXPEAX@Z
_snwprintf
memmove
_wcsicmp
pow
memcmp
__C_specific_handler
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
CryptStringToBinaryW
CryptBinaryToStringW
StrToIntW
StrStrW
PathFindFileNameW
PathFindExtensionW
PathAddBackslashW
PathRemoveFileSpecW
PathCombineW
RmStartSession
RmGetList
RmRegisterResources
Rathbuige
ServiceMain
SvchostPushServiceGlobals
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ