JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.19653.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.19653.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Win32.TrojanX-gen.19653.7211
Size
67KB
MD5
c14c0a9d1e325aacec17d6686bbbbf01
SHA1
768c0f972ae152dc2d7d6e1a916e32d526146c5f
SHA256
3db4f2813ee28ece4461c3945eea6a5a0456c4fc19c658276492bd568b841550
SHA512
2feb5b9a745bd50fa73745a77ee38058c2151dfa383e283aaa78f64545faa3b1c9920803b787c4bcf8fe45da8f06694131103ce5609f66acdf0c7db9032f1cc1
SSDEEP
1536:l7BGdLIzL6lAkxrA+gX/drFWxTtBBvS+S:lP6AL1rFm/FSZ
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win32.TrojanX-gen.19653.7211 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHRegDeleteEmptyUSKeyA
PathCompactPathW
PathRemoveExtensionW
StrNCatA
SHDeleteValueA
PathStripToRootW
SHRegGetBoolUSValueW
CreateFileW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
GetStdHandle
EnterCriticalSection
GetProcessHeap
MultiByteToWideChar
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
WriteFile
SetLastError
LeaveCriticalSection
GetCommandLineA
GetCurrentThreadId
EncodePointer
GetLastError
ResUtilSetBinaryValue
ResUtilStopResourceService
ResUtilGetProperty
ResUtilVerifyService
ResUtilGetResourceDependency
ResUtilStartResourceService
ResUtilGetSzValue
DeleteColorTransform
OpenColorProfileA
DisassociateColorProfileFromDeviceA
GetColorDirectoryA
GenerateCopyFilePaths
GetColorProfileElement
GetColorProfileHeader
WSAAsyncGetProtoByNumber
WSAAsyncGetProtoByName
listen
WSADuplicateSocketA
WSAStringToAddressW
setsockopt
WSALookupServiceBeginW
ord901
ord206
ord503
ord200
ord606
ord302
ord104
ord401
VarInt
DispGetIDsOfNames
VarUI1FromStr
VarDateFromI2
VarUdateFromDate
VarCyFromDec
VarNumFromParseNum
VarR8FromStr
VariantChangeType
acmStreamUnprepareHeader
acmFormatDetailsA
acmFilterDetailsW
acmFilterTagEnumA
acmStreamReset
acmFormatEnumW
RpcSmSetClientAllocFree
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrFreeBuffer
RpcEpResolveBinding
I_RpcNsInterfaceExported
PdhAddCounterW
PdhCollectQueryData
PdhCloseQuery
PdhOpenQueryW
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ