JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.16641.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.16641.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Win32.TrojanX-gen.16641.14472
Size
68KB
MD5
2b983ecbf9901b06b6e91a8fdbe21a28
SHA1
547eae14097c6ecedf3529d90f9db02223400926
SHA256
fbb1aff6a6d2ffb62e4173f4c313f0e480a8d52a53398829369f763e2cd674e1
SHA512
c2c07170da84b19ae08183b7be741a4e770ed0cf19955eda5eade0862481017b9e5c8350ce2d6bf2e0a352592bb1babb2a259bb3922c90d6aeb7412eecf020e8
SSDEEP
768:wTr4XWSGvSewnYVLx60SAbkR5XIJn8kEV9tNk8A+Q5bYWrLEWWHNKaqX3GqXyfdl:wgBG6wdVSGSXSOUXZP2rFaxTtBqgg
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Win32.TrojanX-gen.16641.14472 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFindNextComponentW
StrCpyW
PathRemoveArgsA
SHQueryInfoKeyW
SHRegEnumUSValueA
GetCurrentThreadId
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
CancelIo
SetProcessPriorityBoost
GetNamedPipeInfo
SignalObjectAndWait
ReadFile
SetCalendarInfoW
PeekNamedPipe
GetDiskFreeSpaceExW
Sleep
GetCurrentProcess
VirtualProtect
EnumSystemCodePagesW
K32GetProcessMemoryInfo
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryExW
GetModuleFileNameW
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCommandLineA
CreateFileW
EncodePointer
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetProcessHeap
GetStdHandle
GetFileType
CheckBitmapBits
GetPS2ColorRenderingIntent
DisassociateColorProfileFromDeviceA
ord1
GetStandardColorSpaceProfileA
SetColorProfileElementReference
TranslateBitmapBits
GetColorDirectoryA
ord207
OpenPrinterW
EndPagePrinter
AddPrintProvidorA
EnumMonitorsA
EnumMonitorsW
ResetPrinterW
EnumPortsW
EnumPrinterKeyA
SysAllocString
VariantCopyInd
CreateDispTypeInfo
VectorFromBstr
ord1120
gethostbyname
ntohl
WSAIsBlocking
ord1105
WSACancelAsyncRequest
ord1141
MigrateWinsockConfiguration
__WSAFDIsSet
ord1103
PdhGetFormattedCounterValue
PdhCloseQuery
PdhCollectQueryData
PdhOpenQueryA
PdhGetDefaultPerfCounterA
PdhUpdateLogFileCatalog
PdhIsRealTimeQuery
PdhOpenQueryW
PdhAddCounterW
ord85
ord89
ord53
ord27
ord82
ord78
JKbtgdfd
_GetCPUUsage@0
_GetDiskIOUsage@0
_GetDiskUsage@0
_GetMemoryUsage@0
_GetNetworkUsage@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ