GetVerifyCodePrivate
ServiceRouteExA
StartServiceEx
StopServiceEx
g_hModule
Static task
static1
Behavioral task
behavioral1
Sample
0241864704fe13b5ec0f3c68b74bfd9b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0241864704fe13b5ec0f3c68b74bfd9b.dll
Resource
win10v2004-20231215-en
Target
0241864704fe13b5ec0f3c68b74bfd9b
Size
17KB
MD5
0241864704fe13b5ec0f3c68b74bfd9b
SHA1
80c3834712cdfe525ebca671f82d26e956210c28
SHA256
33e22c9a8fcabf0f9b5487aa03aa41480152335f5b7a11ed99f8545db99d9761
SHA512
bb66bf0a27e18dce68fa3051d42d5f4a0905f4d32606fb7a26bc2f1ec728bd79067d701e1173aba7e74681137c824cc1db54c7644097b81e361cebf13f227da9
SSDEEP
384:rSjGkgbQ8WOYz04UuBBQARQklUyZAAAa:r6g3Yz3BBQARQkhC
Checks for missing Authenticode signature.
resource |
---|
0241864704fe13b5ec0f3c68b74bfd9b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strstr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
ReadFile
OutputDebugStringA
LeaveCriticalSection
InitializeCriticalSection
GetLocalTime
IsBadReadPtr
GetPrivateProfileStringA
lstrcpyA
lstrcmpiA
lstrcmpA
WriteFile
WaitForSingleObject
TerminateThread
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
MultiByteToWideChar
EnterCriticalSection
VirtualProtectEx
lstrcatA
lstrlenA
CreateThread
DeleteCriticalSection
Sleep
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetVerifyCodePrivate
ServiceRouteExA
StartServiceEx
StopServiceEx
g_hModule
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ