JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Loader.1600.23904.32084.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Loader.1600.23904.32084.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Trojan.Loader.1600.23904.32084.dll
Size
85KB
MD5
bec818ac85f4a30c99ff06c1053e2793
SHA1
fbbf5ab50d580aab1ae9598fbfd44a5a0197aa20
SHA256
b060f52b9f1e7aa586bad42de8f219d0b074966e671fa293680a207005f12be9
SHA512
c6f88a7ce0a1865d9f0d3fd93957d497ec1018475b1101e6cf1621f2dee28d356e07ae9991b86145893958815e5b6d2ae6147728569421d383d1d816f37f5738
SSDEEP
1536:pdeklkWKs0KD/mq5A/xWuTXShn6MLfreuMJEbsWZLcdpyI0hATte1kyZt:p5Kvtq5kVXShnTaHyPap8hI0kyZt
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Trojan.Loader.1600.23904.32084.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetIMCLockCount
ImmUnregisterWordA
ImmSetCompositionWindow
ImmSetCompositionStringW
ImmGetRegisterWordStyleA
ImmReleaseContext
ImmGetConversionStatus
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwind
InterlockedFlushSList
TerminateProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
DecodePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
ord146
ord177
ord59
ord189
ord64
ord141
ord144
ord75
ord34
CreateAsyncBindCtx
HlinkGoForward
ReleaseBindInfo
WriteHitLogging
CreateFormatEnumerator
URLOpenStreamW
HlinkGoBack
BindAsyncMoniker
ObtainUserAgentString
MkParseDisplayNameEx
RegisterMediaTypeClass
ntohs
recv
accept
getservbyport
htons
WSAGetOverlappedResult
getservbyname
RtmDeleteRouteTable
RtmGetRouteAge
RtmGetNetworkCount
MgmTakeInterfaceOwnership
RtmCloseEnumerationHandle
MgmGetMfe
MgmGetNextMfe
I_RpcServerRegisterForwardFunction
NdrNsSendReceive
DceErrorInqTextW
NdrServerCall
NdrSimpleTypeMarshall
NdrRpcSmSetClientToOsf
RpcProtseqVectorFreeW
SetServiceW
GetTypeByNameW
GetAddressByNameA
GetNameByTypeW
s_perror
AcceptEx
GetServiceW
EnumProtocolsW
GetAcceptExSockaddrs
inet_network
SafeArrayGetElemsize
VarI1FromR4
VarUI2FromI4
VariantCopy
VarBoolFromR8
VariantTimeToSystemTime
SafeArrayUnaccessData
VarUI2FromR8
CoInstall
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
PdhCloseQuery
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ