JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.11161.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.11161.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Win32.TrojanX-gen.11161.21621
Size
68KB
MD5
62262bbc977707697f64b904a609d9c2
SHA1
6189e0035d8b4509c58bb390c626af2b8b1ebb1f
SHA256
610d7fb3ce00435f5103529947f75097cd2acf1317f0923f2c00b2af716f79ff
SHA512
4a5460fa527ef741e657816f5d085754e7619329f5f1e10baa98fbfeb27733f03f9f9b50be6e7cd1afb16dcecf2e0697180a06bdf823d590cdf2cb275cd9bdc2
SSDEEP
1536:RUwav11rvIhnsb4qj0yW1XudrFGxTtBWT0:RUWtyIqrF2/W
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win32.TrojanX-gen.11161.21621 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHRegDeleteEmptyUSKeyA
PathCompactPathW
PathRemoveExtensionW
StrNCatA
SHDeleteValueA
PathStripToRootW
SHRegGetBoolUSValueW
CreateFileW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
GetStdHandle
EnterCriticalSection
GetProcessHeap
MultiByteToWideChar
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
WriteFile
SetLastError
LeaveCriticalSection
GetCommandLineA
GetCurrentThreadId
EncodePointer
GetLastError
ResUtilSetBinaryValue
ResUtilStopResourceService
ResUtilGetProperty
ResUtilVerifyService
ResUtilGetResourceDependency
ResUtilStartResourceService
ResUtilGetSzValue
DeleteColorTransform
OpenColorProfileA
DisassociateColorProfileFromDeviceA
GetColorDirectoryA
GenerateCopyFilePaths
GetColorProfileElement
GetColorProfileHeader
WSAAsyncGetProtoByNumber
WSAAsyncGetProtoByName
listen
WSADuplicateSocketA
WSAStringToAddressW
setsockopt
WSALookupServiceBeginW
ord901
ord206
ord503
ord200
ord606
ord302
ord104
ord401
VarInt
DispGetIDsOfNames
VarUI1FromStr
VarDateFromI2
VarUdateFromDate
VarCyFromDec
VarNumFromParseNum
VarR8FromStr
VariantChangeType
acmStreamUnprepareHeader
acmFormatDetailsA
acmFilterDetailsW
acmFilterTagEnumA
acmStreamReset
acmFormatEnumW
RpcSmSetClientAllocFree
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrFreeBuffer
RpcEpResolveBinding
I_RpcNsInterfaceExported
PdhAddCounterW
PdhCollectQueryData
PdhCloseQuery
PdhOpenQueryW
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ