Dfreefunc
GetFileMapLen
LibMain
ServiceHandler
ServiceMain
botstart
Static task
static1
Behavioral task
behavioral1
Sample
1ecceff22ba15beab95ad5a4b3404076.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ecceff22ba15beab95ad5a4b3404076.dll
Resource
win10v2004-20231215-en
Target
1ecceff22ba15beab95ad5a4b3404076
Size
382KB
MD5
1ecceff22ba15beab95ad5a4b3404076
SHA1
94e79009ee1a1787564ec1580f0158f5b5269f56
SHA256
c6e84282fc9ecb1bb197791b87f2e0ef5bb38cd7fc107d5ae3654f2f7252ef21
SHA512
d468eccc3d7d2987b81263b766378ba62fd17e4597e07cccc13b137932075582933b5bf1f4fb8dc18652167e43085237aa40a9c1a803a440d821acac1850996a
SSDEEP
6144:7+774cbeknFyxto7NcVTPcxB7lIQA/xiZc:7+7EcJn4M6VTkxP
Checks for missing Authenticode signature.
resource |
---|
1ecceff22ba15beab95ad5a4b3404076 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
htons
inet_addr
inet_ntoa
listen
ntohl
ntohs
recv
select
accept
send
sendto
setsockopt
socket
gethostbyaddr
gethostbyname
bind
gethostname
WSAAsyncSelect
closesocket
WSAGetLastError
WSAStartup
WSACleanup
connect
getsockname
WSASocketA
htonl
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenUrlA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
ShellExecuteA
NetApiBufferFree
NetLocalGroupAddMembers
NetLocalGroupDelMembers
NetLocalGroupGetMembers
NetServerGetInfo
NetUserAdd
NetUserDel
NetUserEnum
NetUserSetInfo
WNetCancelConnection2A
WNetAddConnection2A
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetDriveTypeA
GetEnvironmentStringsA
GetExitCodeThread
GetFileSize
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetTickCount
GetVersionExA
GlobalMemoryStatus
CopyFileA
HeapAlloc
HeapFree
LoadLibraryA
MapViewOfFile
MapViewOfFileEx
MoveFileA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
CreateFileA
ReadFile
CreateFileMappingA
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RtlUnwind
SetFileAttributesA
SetFilePointer
CreateMutexA
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQueryEx
CreateProcessA
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WriteProcessMemory
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
MessageBoxA
ExitWindowsEx
wsprintfA
EnumServicesStatusA
AdjustTokenPrivileges
GetSidSubAuthority
GetTokenInformation
GetUserNameA
ImpersonateLoggedOnUser
LogonUserA
LookupAccountNameA
LookupAccountSidA
LookupPrivilegeValueA
OpenEventLogA
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceConfigA
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ChangeServiceConfigA
RegisterServiceCtrlHandlerA
RevertToSelf
ClearEventLogA
SetServiceStatus
StartServiceA
CloseServiceHandle
ControlService
CreateProcessAsUserA
CreateServiceA
DeleteService
DuplicateTokenEx
_fdopen
_getcwd
_mkdir
_open_osfhandle
rename
_rmdir
_sleep
_stricmp
_strnicmp
_strrev
_wcsicmp
atoi
atol
clock
exit
fclose
feof
fgets
fopen
fwrite
_cexit
malloc
memcpy
memset
printf
raise
rand
setbuf
_chdir
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
wcstombs
Dfreefunc
GetFileMapLen
LibMain
ServiceHandler
ServiceMain
botstart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ