UiadfiadAhusadghsdghus
Vfaifuoasufiasiufdah
timeGetTime
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.Trojan-gen.11097.30934.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.Trojan-gen.11097.30934.dll
Resource
win10v2004-20230220-en
Target
SecuriteInfo.com.Win64.Trojan-gen.11097.30934.exe
Size
760KB
MD5
6f68149bcfaa35754bb295357774566d
SHA1
ef08014f527a7e2da9c13df0c3209062ab99b14a
SHA256
acc65c1dd183932975df19b111d19ade92ef523271973452de3d00d17bd6d699
SHA512
38a1efdad2485d4fab1e36779a4a7c24f3bac578b13be624b0e9208cd49208fabc611cdf3c535a28c7e5decc391a32ea201b500a02da7ef69b43f105a1de16ac
SSDEEP
12288:qTKr6MTecIuED6/c9H6SYCVn9x4AaU6ubam5z74V3N06RsBQcDp3GUX9bkWfWD:FrZlLyHb1zfRaU743KQMpltbfI
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win64.Trojan-gen.11097.30934.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CancelIo
WriteProfileStringW
LocalLock
QueryThreadpoolStackInformation
QueryInformationJobObject
CloseThreadpoolWork
EnumResourceTypesExW
GetOEMCP
CloseThreadpool
StartThreadpoolIo
GetFileInformationByHandleEx
SetThreadLocale
CompareFileTime
GlobalHandle
GetFileSizeEx
InitOnceExecuteOnce
GetNumaAvailableMemoryNodeEx
GetProcessShutdownParameters
WriteProcessMemory
SetHandleInformation
HeapCreate
WritePrivateProfileStringW
EnumResourceLanguagesExW
FindFirstFileExW
GetBinaryTypeW
RtlUnwind
SetEventWhenCallbackReturns
EraseTape
SetWaitableTimer
CompareStringW
SetThreadDescription
FindFirstVolumeW
VirtualProtect
GetConsoleScreenBufferInfo
SetConsoleDisplayMode
CreateDirectoryTransactedW
SetLastError
SetPriorityClass
CreateEventExW
SetConsoleTextAttribute
SetLocalTime
EnterCriticalSection
VirtualFree
GetSystemTimeAdjustment
GetHandleInformation
IsThreadpoolTimerSet
EnumCalendarInfoExEx
SetSystemPowerState
GetFullPathNameW
GetCurrentProcess
GetStdHandle
SetProcessAffinityMask
GetThreadErrorMode
CreateWaitableTimerW
GetProcessDEPPolicy
ReleaseSemaphore
WriteFile
TzSpecificLocalTimeToSystemTimeEx
GetThreadIdealProcessorEx
lstrcpynW
CheckTokenMembershipEx
GetFileBandwidthReservation
GetSystemDefaultUILanguage
CreatePrivateNamespaceW
GetShortPathNameW
GetDiskFreeSpaceW
SetConsoleMode
GetConsoleCursorInfo
GetPrivateProfileIntW
OutputDebugStringA
GetStringTypeExW
DeviceIoControl
VirtualAlloc
GetNumberOfConsoleMouseButtons
GetProcessAffinityMask
PrefetchVirtualMemory
SetThreadpoolWaitEx
SetFileTime
OpenPrivateNamespaceW
WakeConditionVariable
CreateThreadpoolIo
DeleteFiber
GetSystemTimes
WaitForMultipleObjects
InitializeProcThreadAttributeList
GetCommModemStatus
RequestWakeupLatency
GetConsoleCP
GetThreadSelectorEntry
GetGeoInfoW
AddScopedPolicyIDAce
SetConsoleWindowInfo
GetCompressedFileSizeTransactedW
GetNumaNodeNumberFromHandle
CheckTokenCapability
GetProcessId
SignalObjectAndWait
VirtualUnlock
DeleteTimerQueueEx
GetUserDefaultUILanguage
GetConsoleFontSize
SetSystemFileCacheSize
InitializeCriticalSectionAndSpinCount
DeleteAtom
GetNamedPipeClientProcessId
GetDynamicTimeZoneInformation
FoldStringW
InitializeCriticalSection
Wow64GetThreadContext
SetSystemTime
SetErrorMode
InitializeConditionVariable
SetFilePointer
InitOnceInitialize
GetProcessMitigationPolicy
TryAcquireSRWLockShared
GetNumaAvailableMemoryNode
GetConsoleTitleW
GetEnvironmentVariableW
GetSystemPowerStatus
EnumResourceNamesW
UnlockFileEx
FlushProcessWriteBuffers
CreateBoundaryDescriptorW
PeekNamedPipe
FatalExit
EnumCalendarInfoExW
GetWriteWatch
InitializeCriticalSectionEx
GetLargePageMinimum
GetPrivateProfileSectionW
WaitForMultipleObjectsEx
SystemTimeToTzSpecificLocalTimeEx
GetConsoleScreenBufferInfoEx
IsNLSDefinedString
LocalAlloc
CreateFileW
GetDateFormatEx
GetNumberFormatEx
UnregisterBadMemoryNotification
DebugActiveProcessStop
OpenEventW
GetPrivateProfileSectionNamesW
QueryThreadCycleTime
WaitForThreadpoolWorkCallbacks
GetCommTimeouts
SetThreadpoolThreadMinimum
GetSystemDirectoryW
SetSearchPathMode
IsSystemResumeAutomatic
GetComputerNameExW
CallbackMayRunLong
ContinueDebugEvent
GetAtomNameW
MapUserPhysicalPages
GetApplicationRecoveryCallback
DuplicateHandle
HeapValidate
lstrcatA
IsProcessInJob
GetSystemDefaultLangID
GetACP
PrepareTape
FindFirstChangeNotificationW
LCIDToLocaleName
HeapSize
SetProcessMitigationPolicy
ApplicationRecoveryInProgress
CancelWaitableTimer
QueueUserWorkItem
SetFileAttributesW
GetLogicalDriveStringsW
CreateEventW
RemoveSecureMemoryCacheCallback
SetFileAttributesTransactedW
ConvertThreadToFiberEx
MultiByteToWideChar
GetSystemWow64DirectoryW
GetPrivateProfileStringW
SetVolumeLabelW
GetConsoleMode
SetTapeParameters
LoadPackagedLibrary
FormatMessageW
WritePrivateProfileStructW
GetDurationFormat
ReadThreadProfilingData
PowerCreateRequest
GetTickCount64
LCMapStringEx
SetCalendarInfoW
Wow64RevertWow64FsRedirection
FlsSetValue
GetLargestConsoleWindowSize
GetCurrencyFormatEx
WaitForThreadpoolWaitCallbacks
CreateFileTransactedW
EscapeCommFunction
UpdateProcThreadAttribute
GetConsoleAliasesLengthW
TzSpecificLocalTimeToSystemTime
ReleaseSRWLockExclusive
GetConsoleDisplayMode
GetConsoleProcessList
SetFileInformationByHandle
OutputDebugStringW
ConvertDefaultLocale
FindNextVolumeMountPointW
WaitCommEvent
ReadConsoleInputW
SetThreadpoolTimerEx
FlushViewOfFile
GlobalSize
GetThreadUILanguage
CreateFileA
GetUserDefaultLCID
GetLogicalDrives
SetProcessPriorityBoost
GetNamedPipeHandleStateW
GetSystemFileCacheSize
OfferVirtualMemory
GetMailslotInfo
InitOnceComplete
GetActiveProcessorGroupCount
GetNumaProximityNodeEx
EnumDateFormatsExEx
GetApplicationRestartSettings
SetWaitableTimerEx
PulseEvent
ReclaimVirtualMemory
QueryPerformanceFrequency
EnumResourceNamesExW
GlobalFlags
CreateHardLinkTransactedW
DeleteFileW
OpenSemaphoreW
lstrcpyA
MoveFileTransactedW
GlobalFree
CloseHandle
CreateThreadpoolCleanupGroup
SetThreadpoolTimer
GetNumberFormatW
EnumResourceLanguagesW
RaiseException
FreeConsole
GetSystemInfo
CreateSymbolicLinkTransactedW
GetProcessHeaps
WriteProfileSectionW
ReadFileEx
LoadLibraryW
CancelIoEx
ResetEvent
SetComputerNameW
GetActiveProcessorCount
DiscardVirtualMemory
EnumDateFormatsExW
HeapAlloc
WriteConsoleInputW
Wow64SuspendThread
GetCurrencyFormatW
QueueUserAPC
FatalAppExitW
GetLocalTime
GetConsoleOriginalTitleW
GetDefaultCommConfigW
GetMemoryErrorHandlingCapabilities
GetNLSVersionEx
FillConsoleOutputAttribute
GetProcessPreferredUILanguages
SetStdHandle
CloseThreadpoolIo
VirtualProtectEx
AddSIDToBoundaryDescriptor
SetVolumeMountPointW
AddVectoredExceptionHandler
SetFirmwareEnvironmentVariableW
FindNextFileNameW
GetNamedPipeClientSessionId
QueryIdleProcessorCycleTimeEx
IsThreadAFiber
GetCurrentProcessorNumber
GetDurationFormatEx
ReadDirectoryChangesW
SubmitThreadpoolWork
DeleteFileTransactedW
SetLocaleInfoW
SetThreadGroupAffinity
InitAtomTable
SetCurrentDirectoryW
GetWindowsDirectoryW
PeekConsoleInputW
WriteConsoleW
VirtualLock
SetProcessDEPPolicy
Beep
GetProcAddress
GlobalLock
UnregisterApplicationRestart
SetFilePointerEx
VirtualAllocEx
DebugActiveProcess
FindFirstFileNameTransactedW
GetTimeFormatW
MoveFileExW
GetThreadId
GetProcessorSystemCycleTime
GetOverlappedResultEx
ReplaceFileW
AcquireSRWLockShared
SetThreadStackGuarantee
IsProcessorFeaturePresent
GetFileSize
SetDefaultCommConfigW
CreateMemoryResourceNotification
DeleteCriticalSection
ExitProcess
FindAtomW
VerSetConditionMask
LCMapStringW
ReadProcessMemory
GetComputerNameW
SetProtectedPolicy
FindVolumeClose
GetCurrentProcessId
GetProcessHeap
GlobalMemoryStatusEx
IsValidLocale
GetModuleHandleW
SetFirmwareEnvironmentVariableExW
CreateSemaphoreW
TransactNamedPipe
CopyFileW
GetProfileStringW
WideCharToMultiByte
GetConsoleWindow
WinExec
CreateRemoteThread
DeleteBoundaryDescriptor
LocaleNameToLCID
WritePrivateProfileSectionW
BeginUpdateResourceW
SystemTimeToTzSpecificLocalTime
FreeUserPhysicalPages
ReadConsoleOutputCharacterW
CreateProcessA
SetConsoleOutputCP
GetSystemTimeAsFileTime
GetFileType
EnumSystemGeoID
DeleteTimerQueueTimer
LocalFlags
QueryIdleProcessorCycleTime
GetSystemTime
Wow64GetThreadSelectorEntry
GetThreadGroupAffinity
GlobalMemoryStatus
GetFirmwareType
DeleteVolumeMountPointW
SetThreadErrorMode
VirtualFreeEx
CopyFileExW
CreateWaitableTimerExW
IsBadReadPtr
CreateFileMappingW
InterlockedPushEntrySList
DosDateTimeToFileTime
SetThreadPreferredUILanguages
MapViewOfFile
GetProcessPriorityBoost
GetSystemWindowsDirectoryW
GetNumaNodeProcessorMaskEx
FindNextVolumeW
SetFileValidData
lstrcmpiW
BackupSeek
QueryPerformanceCounter
GetStringTypeW
GetDateFormatW
FreeLibraryWhenCallbackReturns
CreateIoCompletionPort
OpenMutexW
SetCommTimeouts
GetTickCount
WaitNamedPipeW
SetCommState
SetCommConfig
GetCalendarInfoEx
AllocConsole
ConvertThreadToFiber
SetTapePosition
EnumDateFormatsW
WriteConsoleOutputW
GetDllDirectoryW
GetProcessHandleCount
FlsAlloc
MulDiv
MapViewOfFileEx
GetFirmwareEnvironmentVariableW
MoveFileW
RegisterApplicationRestart
IsWow64Process
GetVolumeInformationByHandleW
GetDriveTypeW
GetFileTime
OpenThread
AddIntegrityLabelToBoundaryDescriptor
LoadLibraryExW
DebugBreakProcess
GetConsoleSelectionInfo
IsDebuggerPresent
QueryDepthSList
SetFileCompletionNotificationModes
CreateTimerQueue
CreateDirectoryExW
IsBadStringPtrW
GetCurrentConsoleFont
FileTimeToDosDateTime
RegisterApplicationRecoveryCallback
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
IsValidCodePage
FindNextFileW
FindClose
SetInformationJobObject
GetVolumeInformationW
GetProcessWorkingSetSize
EnumTimeFormatsW
AddVectoredContinueHandler
SetConsoleCtrlHandler
SetConsoleHistoryInfo
SetFileIoOverlappedRange
TryEnterCriticalSection
RemoveDirectoryTransactedW
QueryDosDeviceW
BackupWrite
PowerSetRequest
EnumLanguageGroupLocalesW
QueryUnbiasedInterruptTime
InitializeSRWLock
GetProcessWorkingSetSizeEx
ReadFile
EnterSynchronizationBarrier
GetCPInfoExW
GetStartupInfoW
GetPrivateProfileStructW
GetSystemFirmwareTable
SetThreadAffinityMask
FileTimeToSystemTime
CreateDirectoryW
HeapFree
GetNumaNodeProcessorMask
GetNumaHighestNodeNumber
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
RtlPcToFileHeader
GetLastError
EncodePointer
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
TerminateProcess
GetModuleHandleExW
GetModuleFileNameW
GetGuiResources
SetTimer
SetCoalescableTimer
SendDlgItemMessageW
MessageBoxW
GetSysColor
UnhookWindowsHookEx
SetLayeredWindowAttributes
IntersectRect
DdeFreeStringHandle
GetAncestor
MessageBoxA
GetBkColor
GetLayout
CreateDIBitmap
EnumFontsW
Chord
SetLayout
OffsetViewportOrgEx
DeleteEnhMetaFile
SetViewportExtEx
SetPolyFillMode
GetTextAlign
GetEnhMetaFileDescriptionW
CreateDiscardableBitmap
SetViewportOrgEx
CreatePalette
GetTextColor
SetDCBrushColor
SetBkColor
GetGlyphOutlineW
RemoveFontResourceExW
FlattenPath
GetObjectType
RoundRect
SetDCPenColor
GetROP2
PathFileExistsA
CryptStringToBinaryA
UiadfiadAhusadghsdghus
Vfaifuoasufiasiufdah
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ