CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins4
Static task
static1
Behavioral task
behavioral1
Sample
0947729a7a3cba10741a57653ffb67b9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0947729a7a3cba10741a57653ffb67b9.dll
Resource
win10v2004-20231215-en
Target
0947729a7a3cba10741a57653ffb67b9
Size
29KB
MD5
0947729a7a3cba10741a57653ffb67b9
SHA1
46580ce5cdec8ca7acb817ae5c17f43233a431d8
SHA256
cc6c87de94142c7f3ddf526bd981c6ca18be937cac8c23300e6e19cddd326c4a
SHA512
8e53986ae6dc63ab84f6db4f3d715da7bc728673980a7f90c0b1dd4e8479bd5f9c3b2a67daf7bcdf0ee8efac0312bc9d80e873613184dcc82a70c5f3fdda4b65
SSDEEP
384:gSppKZvBGl/rj7tR93NtJXf8F2JwCXIfP16mNGzsW6v:gSeZvIl/rjpR9nJX5XcP1nNG76
Checks for missing Authenticode signature.
resource |
---|
0947729a7a3cba10741a57653ffb67b9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
FindClose
FindNextFileA
lstrcpynA
WaitForSingleObject
lstrcmpA
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcpyA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
sprintf
strcpy
strstr
strncat
strcat
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
ins4
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ