JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Loader.1600.24592.8762.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Loader.1600.24592.8762.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Trojan.Loader.1600.24592.8762.dll
Size
83KB
MD5
2a75c3cdfb65adf97d131b26ec63e21d
SHA1
0a23721209a1813b606bccd755b707614a3c2da6
SHA256
da7913ffbcf7cf4d5ccb13551971ef69fbe9abc4590c866c2a1bd05f1805e53e
SHA512
4fb0c015e753ae60a76640dc864b500a9a316f2050d970e688d8e37e77c6dcb5a4a84521cc04cae9b4e57a7baea0855f0857249eb90746da0b5b9264059fc139
SSDEEP
1536:yd13lwSS42x5AW0iXlbnWyLMreuMJEbsWZLcdp3I0h7TtBFImO2rZt:yS/7x5JXlbnGaHyPap/h3/o2rZt
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Trojan.Loader.1600.24592.8762.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImmGetIMCLockCount
ImmUnregisterWordA
ImmSetCompositionWindow
ImmSetCompositionStringW
ImmGetRegisterWordStyleA
ImmReleaseContext
ImmGetConversionStatus
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwind
InterlockedFlushSList
TerminateProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
DecodePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
ord146
ord177
ord59
ord189
ord64
ord141
ord144
ord75
ord34
CreateAsyncBindCtx
HlinkGoForward
ReleaseBindInfo
WriteHitLogging
CreateFormatEnumerator
URLOpenStreamW
HlinkGoBack
BindAsyncMoniker
ObtainUserAgentString
MkParseDisplayNameEx
RegisterMediaTypeClass
ntohs
recv
accept
getservbyport
htons
WSAGetOverlappedResult
getservbyname
RtmDeleteRouteTable
RtmGetRouteAge
RtmGetNetworkCount
MgmTakeInterfaceOwnership
RtmCloseEnumerationHandle
MgmGetMfe
MgmGetNextMfe
I_RpcServerRegisterForwardFunction
NdrNsSendReceive
DceErrorInqTextW
NdrServerCall
NdrSimpleTypeMarshall
NdrRpcSmSetClientToOsf
RpcProtseqVectorFreeW
SetServiceW
GetTypeByNameW
GetAddressByNameA
GetNameByTypeW
s_perror
AcceptEx
GetServiceW
EnumProtocolsW
GetAcceptExSockaddrs
inet_network
SafeArrayGetElemsize
VarI1FromR4
VarUI2FromI4
VariantCopy
VarBoolFromR8
VariantTimeToSystemTime
SafeArrayUnaccessData
VarUI2FromR8
CoInstall
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
PdhCloseQuery
PdhGetFormattedCounterValue
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ