JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Zusy.475489.19146.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Zusy.475489.19146.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Variant.Zusy.475489.19146.28545
Size
255KB
MD5
ecb430093c06b40d7c45e45825683f62
SHA1
ea6b904191860ea5019673cff7b7187a76a73d8d
SHA256
83ce29d1b74162d5c6804395535f0f9cf0b09d2b482d4db18bbdfe404b18a4c6
SHA512
af5531b0622f97f49036477d3006c982b1e017b3c880462a7ae22c07cd68ef91db978b9f9c03324f48dd35f2a3134e768180592965bc302af5f341a8aec427e2
SSDEEP
6144:nZL+74MyFAWMVF7WZ+XvUerPFdmgxgbYSv4Zul7mbo7Vym:np+7vyFAWMVFyZ+fU6PFdmJYful7ioph
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Variant.Zusy.475489.19146.28545 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetGuideLineW
ImmUnregisterWordW
ImmGetDescriptionW
ImmSetCompositionStringA
StrChrA
UrlIsNoHistoryA
UrlApplySchemeW
UrlUnescapeW
UrlGetLocationW
PathAddExtensionA
StrCpyNW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleW
GetProcAddress
EnumSystemCodePagesW
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
CreateFileW
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
CloseHandle
WriteConsoleW
OutputDebugStringW
GetStringTypeW
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
DecodePointer
PdhEnumObjectItemsA
PdhConnectMachineA
PdhMakeCounterPathW
PdhAddCounterA
ord904
ord500
ord101
ord205
ord106
acmStreamOpen
acmDriverID
acmFormatTagDetailsW
acmDriverAddW
SafeArrayGetIID
SafeArrayGetUBound
VarCyAbs
VarI2FromDec
VarR4FromUI1
WNetGetUniversalNameA
WNetCancelConnectionA
WNetGetNetworkInformationA
WNetGetResourceInformationW
WNetGetResourceParentA
CryptMsgSignCTL
CryptEncryptMessage
CertNameToStrA
WSAGetQOSByName
setsockopt
WSCEnableNSProvider
getprotobynumber
listen
WSAIoctl
WSACancelBlockingCall
JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ