JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.25330.2512.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.25330.2512.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Win32.TrojanX-gen.25330.2512.dll
Size
68KB
MD5
d95069a077ab9edd0c1a3d17cc24c7ba
SHA1
971c94089814bd33898088132197efe7f05315a1
SHA256
a37abbb4c91fc5f974f095736630cda418193b82caa1f4f75389bf855257c701
SHA512
13ec88054cea3081b0aaf0134d191a0a9bf484fc81ca96800a09835733c869f65d2c5e524471fb9a4e74b7a73b81cfe845fb4ab490c60c3a79254a371233614c
SSDEEP
1536:j4w6f1FrvIhnsb4qj0yW1XudrF8xTtB1UB4:j4WtyIqrFU/G
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win32.TrojanX-gen.25330.2512.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHRegDeleteEmptyUSKeyA
PathCompactPathW
PathRemoveExtensionW
StrNCatA
SHDeleteValueA
PathStripToRootW
SHRegGetBoolUSValueW
CreateFileW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
GetStdHandle
EnterCriticalSection
GetProcessHeap
MultiByteToWideChar
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
WriteFile
SetLastError
LeaveCriticalSection
GetCommandLineA
GetCurrentThreadId
EncodePointer
GetLastError
ResUtilSetBinaryValue
ResUtilStopResourceService
ResUtilGetProperty
ResUtilVerifyService
ResUtilGetResourceDependency
ResUtilStartResourceService
ResUtilGetSzValue
DeleteColorTransform
OpenColorProfileA
DisassociateColorProfileFromDeviceA
GetColorDirectoryA
GenerateCopyFilePaths
GetColorProfileElement
GetColorProfileHeader
WSAAsyncGetProtoByNumber
WSAAsyncGetProtoByName
listen
WSADuplicateSocketA
WSAStringToAddressW
setsockopt
WSALookupServiceBeginW
ord901
ord206
ord503
ord200
ord606
ord302
ord104
ord401
VarInt
DispGetIDsOfNames
VarUI1FromStr
VarDateFromI2
VarUdateFromDate
VarCyFromDec
VarNumFromParseNum
VarR8FromStr
VariantChangeType
acmStreamUnprepareHeader
acmFormatDetailsA
acmFilterDetailsW
acmFilterTagEnumA
acmStreamReset
acmFormatEnumW
RpcSmSetClientAllocFree
NdrCStdStubBuffer_Release
NdrDllRegisterProxy
NdrFreeBuffer
RpcEpResolveBinding
I_RpcNsInterfaceExported
PdhAddCounterW
PdhCollectQueryData
PdhCloseQuery
PdhOpenQueryW
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ