ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
1dfedcf2c37631739599fcc736e4572d.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1dfedcf2c37631739599fcc736e4572d.dll
Resource
win10v2004-20231222-en
Target
1dfedcf2c37631739599fcc736e4572d
Size
16KB
MD5
1dfedcf2c37631739599fcc736e4572d
SHA1
fe6f235f670f2da161056ff4dc50a1b0585430aa
SHA256
8c70c9c6060cc4eb98470705bc193e66f49c41f806eb1a38afdf3b7b12abea14
SHA512
64162f9ddb84d56bd02c7a392169764f357524f9d4ab4c85b0fcaa1758c49d20dfa9026aa091e53bf0a7d42d42d73efdd6d25f9e91dd33c3749ac3b64cd24e88
SSDEEP
192:Pp4DCs7GuWS50ZNOp6XKPjI+idSDbFiWF3uBBQ6PRQk/2Wrexh4/P:haCvuWSGfpxwJuBBQARQkhrexa
Checks for missing Authenticode signature.
resource |
---|
1dfedcf2c37631739599fcc736e4572d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostname
closesocket
memcpy
memcmp
strlen
_strupr
strstr
RtlZeroMemory
lstrlenA
TerminateThread
SystemTimeToFileTime
Sleep
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetPrivateProfileIntA
GetLocalTime
GetCurrentProcessId
lstrcmpA
lstrcpyA
lstrcmpiA
WritePrivateProfileStringA
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
VirtualProtectEx
lstrcatA
EnterCriticalSection
CreateThread
DeleteCriticalSection
WaitForSingleObject
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
KillTimer
SetTimer
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ