ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
1aab278bf6afbbd8ca5b21dfdd406fbf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1aab278bf6afbbd8ca5b21dfdd406fbf.dll
Resource
win10v2004-20231215-en
Target
1aab278bf6afbbd8ca5b21dfdd406fbf
Size
16KB
MD5
1aab278bf6afbbd8ca5b21dfdd406fbf
SHA1
fc442766df28f6f1cc572bfe66ec72d4be46bc88
SHA256
567710445358618d161f3e4b1447d13bf971e6baf9f55f37eb24797363f3e0fe
SHA512
1ce6f1b47b663ecc06499afb57684aef037f0b9b9eac240e8d36be0e1c5519489520452aa73d21ffc3ee658aa7575f995c5bad7d789e49a77065bcae63e2d7a7
SSDEEP
192:8GyqCcLGgZWauMZN1pV83qYtYOidrb71YNgXuBBQ6PRQk/2WSexh44PR:PyqCP8WXMfF8QVduBBQARQkhSexa
Checks for missing Authenticode signature.
resource |
---|
1aab278bf6afbbd8ca5b21dfdd406fbf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostname
closesocket
memcpy
memcmp
strlen
_strupr
strstr
RtlZeroMemory
lstrlenA
TerminateThread
SystemTimeToFileTime
Sleep
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetPrivateProfileIntA
GetLocalTime
GetCurrentProcessId
lstrcmpA
lstrcpyA
lstrcmpiA
WritePrivateProfileStringA
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
VirtualProtectEx
lstrcatA
EnterCriticalSection
CreateThread
DeleteCriticalSection
WaitForSingleObject
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
KillTimer
SetTimer
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ