DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Inject1.19122.24205.25163.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Inject1.19122.24205.25163.dll
Resource
win10v2004-20231020-en
Target
SecuriteInfo.com.Trojan.Inject1.19122.24205.25163.exe
Size
33KB
MD5
3f2a17dce077f113b6c194a45f6ad8a5
SHA1
c25a7a48425dc041e1f708e403a564823dcac4af
SHA256
0f59e193ad32132c7021bbdad311b019e6280d25f519ddc3ab9cebc679037f2e
SHA512
99bb59c7f0d303a559c472bb542cd4cab3fc0c11d254bc1698928c5602afc9effd755143b0d16d412d6a470a7e34070128b62ab4efce03f66c3f85ae13ca4a9f
SSDEEP
384:gaBhYO+xp+t33qAIZ17xkgaEDuNH4upfK0C3QxSXo7aPrruM8fLQfjkWC1Ty5aov:gLO+ji33w1WEaGQ0N7kWsTy5BcQh6D9
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Trojan.Inject1.19122.24205.25163.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
UnmapViewOfFile
GetVersion
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalLock
GetModuleFileNameW
GetModuleHandleA
GetTickCount
CloseHandle
MapViewOfFile
WaitForSingleObject
CreateMutexW
OpenEventW
OpenFileMappingW
OpenClipboard
IsClipboardFormatAvailable
LoadKeyboardLayoutA
LoadImageW
ToUnicode
GetAsyncKeyState
GetKeyboardState
DefWindowProcW
EndPaint
BeginPaint
InvalidateRect
CloseClipboard
GetMonitorInfoW
MonitorFromPoint
ReleaseDC
FillRect
GetCaretBlinkTime
SetTimer
GetDC
KillTimer
GetSysColor
ShowWindow
DestroyWindow
SetLayeredWindowAttributes
MoveWindow
GetClipboardData
GetFocus
CreateWindowExW
RegisterClassW
SendInput
SetBkMode
TextOutW
BitBlt
SetTextColor
GetStockObject
CreateSolidBrush
GetTextExtentPoint32W
CreateFontIndirectW
DeleteObject
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectW
RegQueryValueExA
RegOpenKeyExW
RegSetValueExA
RegSetValueW
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
CoCreateInstance
SysAllocString
SysFreeString
SysAllocStringLen
SHDeleteKeyA
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
_itow
wcsrchr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ