CoGetComCatalog
GetRPCSSInfo
INS
ServiceMain
WhichService
Static task
static1
Behavioral task
behavioral1
Sample
1bf499bd9a202314e3076383b5ac2adb.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1bf499bd9a202314e3076383b5ac2adb.dll
Resource
win10v2004-20231215-en
Target
1bf499bd9a202314e3076383b5ac2adb
Size
34KB
MD5
1bf499bd9a202314e3076383b5ac2adb
SHA1
1ef3ad3da2f48257447434e8d5981f25aa82ed4d
SHA256
cbb7613876871796009c6e8d48d2cac91b91bd7841e7ffec75604e23db17daad
SHA512
51bfc338de9fd4c6411f6905b781de7aa996ada428bfff7d5a71431a98423626d55dc7a62c7105e74402ce933e327e94310400cbc9b9f200cde66ca708ea1698
SSDEEP
384:rw0YHclcF6OwZrUi55oDuFV2eDUxPg4qdni:rwZclc0Ow1Ui5Wve6SBi
Checks for missing Authenticode signature.
resource |
---|
1bf499bd9a202314e3076383b5ac2adb |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
WaitForSingleObject
FindFirstFileA
MultiByteToWideChar
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
DeleteFileA
Sleep
CopyFileA
MoveFileExA
SetFileTime
LoadLibraryA
GetProcAddress
lstrcmpA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
memset
CoGetComCatalog
GetRPCSSInfo
INS
ServiceMain
WhichService
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ