EndWork
Runing
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
3e7fb1bd6e33ed89737e0e3d636921dd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e7fb1bd6e33ed89737e0e3d636921dd.dll
Resource
win10v2004-20231215-en
Target
3e7fb1bd6e33ed89737e0e3d636921dd
Size
3.8MB
MD5
3e7fb1bd6e33ed89737e0e3d636921dd
SHA1
6c932b46fcd30e9ad821799e699a2c1791923edc
SHA256
6ab970e77a8d45decf812fd758a6005a87003438a3bdddef2b743f77e121f211
SHA512
757f68e05232350036987698a9ab01af21a7bee58af88a54dff9a67fdde66a21fa687557bc3afd82630cd3c75048acf92edecf1190128cbf47a197e927c5beeb
SSDEEP
3072:u4fgROS1VNDcKCu05cyQd4asj1wwDSicXqQ5m9Pr3DdofYRxYv0sSpMU4HBcbIhu:uGMOS1VNb5whVu/qJ6Sh4HObUZaVc5u
Checks for missing Authenticode signature.
resource |
---|
3e7fb1bd6e33ed89737e0e3d636921dd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateThread
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
HeapAlloc
GetProcessHeap
GetLocalTime
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetTickCount
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
WaitForMultipleObjects
GetStartupInfoA
LocalSize
OpenProcess
TerminateProcess
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetVersionExA
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
OpenEventA
SetErrorMode
CreateThread
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
FlushFileBuffers
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
WriteFile
ExitProcess
FreeLibrary
CreateProcessA
lstrcatA
ReadFile
MoveFileA
SetFilePointer
GetFileSize
DeleteFileA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
ResetEvent
GetLastError
CloseHandle
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
Sleep
VirtualAlloc
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
HeapReAlloc
HeapDestroy
HeapCreate
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetFileType
GetStdHandle
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
WideCharToMultiByte
GetCommandLineA
SetHandleCount
GetWindowTextA
MessageBoxA
LoadCursorA
keybd_event
wsprintfA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
CharNextA
MapVirtualKeyA
LoadIconA
RegisterClassA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorPos
SetRect
GetDC
ReleaseDC
GetCursorInfo
DestroyCursor
SendMessageA
BlockInput
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
GetStockObject
DeleteDC
CreateDCA
RegisterServiceCtrlHandlerA
RegDeleteKeyA
RegRestoreKeyA
RegOpenKeyExA
RegSaveKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
SetServiceStatus
RegOpenKeyA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
OpenEventLogA
ClearEventLogA
CloseEventLog
SHGetSpecialFolderPathA
WSAStartup
closesocket
setsockopt
send
WSACleanup
recv
select
WSAIoctl
htons
gethostbyname
socket
getsockname
EndWork
Runing
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ