Dzsjhkjork
DzService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
0c3418080f78f27fc1127b97827e0508.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c3418080f78f27fc1127b97827e0508.dll
Resource
win10v2004-20231215-en
Target
0c3418080f78f27fc1127b97827e0508
Size
97KB
MD5
0c3418080f78f27fc1127b97827e0508
SHA1
65b26aadbf5a9a424f59d814c96b9a3436a492ca
SHA256
f7ddf0c13324bb59aa32075a806f1397bf43cec279dc6cde315108bcbeec9416
SHA512
b7598bf8b92e00b51c11d0dbccffdec9e944dd05c2e97ef88d13a38c0c9173610f9d796a1a54ce4272826227dda3e7569e945065f4ed003299e205ed14534e2d
SSDEEP
1536:t4h2lL6CdqahoGoi+CTGUo4a8DTurGxJQ6DU+ke:ihuRoY9oi+6LZaMQ6DUe
Checks for missing Authenticode signature.
resource |
---|
0c3418080f78f27fc1127b97827e0508 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
SetThreadDesktop
PostMessageA
wsprintfA
OpenDesktopA
CallNextHookEx
GetForegroundWindow
SetCursorPos
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetMessageA
GetActiveWindow
CharLowerA
PostThreadMessageA
CharUpperA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SendMessageA
SendInput
GetThreadDesktop
UnhookWindowsHookEx
OpenInputDesktop
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
TranslateMessage
CreateWindowExA
RegisterDeviceNotificationA
LoadIconA
LoadCursorA
GetSystemMetrics
LoadImageA
RegisterClassExA
IsWindow
BitBlt
DeleteDC
GetDIBits
CreateCompatibleBitmap
DeleteObject
GetStockObject
GetDeviceCaps
CreateDCA
CreateCompatibleDC
SelectObject
ImpersonateSelf
CreateServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LogonUserA
CreateProcessAsUserA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameW
LookupPrivilegeValueA
StartServiceA
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
CloseServiceHandle
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
listen
setsockopt
bind
socket
closesocket
connect
send
ntohs
accept
WSAStartup
select
recv
inet_addr
gethostbyname
inet_ntoa
htons
getsockname
StrCmpNIA
StrChrA
StrStrA
StrCmpW
SHDeleteKeyA
StrToIntA
StrRChrA
GetModuleFileNameExA
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
capCreateCaptureWindowA
capGetDriverDescriptionA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
__CxxFrameHandler
_beginthread
strchr
free
wcscmp
malloc
strrchr
getenv
rand
srand
time
_strupr
__dllonexit
_onexit
_initterm
_adjust_fdiv
??2@YAPAXI@Z
??3@YAXPAX@Z
GlobalAlloc
GetFileSize
OpenMutexA
OpenEventA
lstrcatW
OpenProcess
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
CopyFileA
lstrlenW
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
LoadLibraryA
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
GetCurrentThreadId
WriteFile
GetCurrentThread
GetCurrentProcessId
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
FlushFileBuffers
SetFilePointer
WideCharToMultiByte
SearchPathA
GetProcAddress
GetModuleFileNameA
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpyA
GetStartupInfoA
lstrcatA
CreateProcessA
Sleep
WaitForSingleObject
GetTickCount
Dzsjhkjork
DzService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ