JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Loader.1600.18016.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Loader.1600.18016.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Trojan.Loader.1600.18016.7656
Size
83KB
MD5
6dd8dc4b9584830f012fcabf9d9fb196
SHA1
70b6c19b7239b8195ee62d308ea6a4adb91c902d
SHA256
b62b93dafe51bb7b40a4f005c7c8d2863eda6495fc21897c3501a703fa91f18a
SHA512
b41a088cd8100079cc76700aa595442e2fef6e3fc079191e4b5554f104c0a7aad1d3cb874032a626ba148cf1c5a9a6c7a3c8160cd658adb773949621ccf8314f
SSDEEP
1536:Id13lwSS42x5AW0iXlbnWyLMreuMJEbsWZLcdpTI0h7TtBTSpZt:IS/7x5JXlbnGaHyPapbh3/TSpZt
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Trojan.Loader.1600.18016.7656 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetIMCLockCount
ImmUnregisterWordA
ImmSetCompositionWindow
ImmSetCompositionStringW
ImmGetRegisterWordStyleA
ImmReleaseContext
ImmGetConversionStatus
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwind
InterlockedFlushSList
TerminateProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
DecodePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
ord146
ord177
ord59
ord189
ord64
ord141
ord144
ord75
ord34
CreateAsyncBindCtx
HlinkGoForward
ReleaseBindInfo
WriteHitLogging
CreateFormatEnumerator
URLOpenStreamW
HlinkGoBack
BindAsyncMoniker
ObtainUserAgentString
MkParseDisplayNameEx
RegisterMediaTypeClass
ntohs
recv
accept
getservbyport
htons
WSAGetOverlappedResult
getservbyname
RtmDeleteRouteTable
RtmGetRouteAge
RtmGetNetworkCount
MgmTakeInterfaceOwnership
RtmCloseEnumerationHandle
MgmGetMfe
MgmGetNextMfe
I_RpcServerRegisterForwardFunction
NdrNsSendReceive
DceErrorInqTextW
NdrServerCall
NdrSimpleTypeMarshall
NdrRpcSmSetClientToOsf
RpcProtseqVectorFreeW
SetServiceW
GetTypeByNameW
GetAddressByNameA
GetNameByTypeW
s_perror
AcceptEx
GetServiceW
EnumProtocolsW
GetAcceptExSockaddrs
inet_network
SafeArrayGetElemsize
VarI1FromR4
VarUI2FromI4
VariantCopy
VarBoolFromR8
VariantTimeToSystemTime
SafeArrayUnaccessData
VarUI2FromR8
CoInstall
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
PdhCloseQuery
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ