DescryptoData
ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
380d360444a514b8047f72501863028c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
380d360444a514b8047f72501863028c.dll
Resource
win10v2004-20231215-en
Target
380d360444a514b8047f72501863028c
Size
19KB
MD5
380d360444a514b8047f72501863028c
SHA1
e15b8eb3b324dca48f071cab0b2437f74d138923
SHA256
2e95824c947d7912d1ab867c9e8bfb6b0dd00eece9d4ddc80d35eb718fcb7852
SHA512
d536d04f9a47bdd5ec71db1c89ea2902f1e8bcc3c81a0d97ea19bc835a82f4a6a506f8804a0c86f9395a795b7af62a476fdd502e4367818b8ec809aebcc4439c
SSDEEP
384:IiGkPf7aTF+6sugDiuBBQARQkfQxX7M4:IFkPfuTFsugDFBBQARQkfqX
Checks for missing Authenticode signature.
resource |
---|
380d360444a514b8047f72501863028c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
RtlZeroMemory
strcpy
memcmp
memcpy
VirtualAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteProcessMemory
VirtualQueryEx
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
ReadProcessMemory
Sleep
TerminateProcess
VirtualProtectEx
VirtualFree
GetWindowThreadProcessId
KillTimer
SetTimer
SetWindowLongA
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowLongA
GetWindowTextA
EnumWindows
wsprintfA
CallNextHookEx
CallWindowProcA
send
gethostname
DescryptoData
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ