Resorce_Get
ServiceMain
SoftWareGoIn
SoftWareTest
SoftWare_Hook
Static task
static1
Behavioral task
behavioral1
Sample
3f588f605e6f2a005312b80db58f7563.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f588f605e6f2a005312b80db58f7563.dll
Resource
win10v2004-20231215-en
Target
3f588f605e6f2a005312b80db58f7563
Size
154KB
MD5
3f588f605e6f2a005312b80db58f7563
SHA1
fd399b1585227b0161c49470013c8fb9d98a02a5
SHA256
aadd69dc8e42c8b57360ce88450c01a83caaeebedac8d73d2999ac3cc36ea6d0
SHA512
594d5f876e2d0b38444882526d083bbae413ebd632b4945b088322fadd3c632575da6d7ab9a12c0b931d1718c5c05993233d6502570643d391e370e1846b6d9e
SSDEEP
3072:xUAX0HxrgrPupPGwj30AzurHRtaxWyUyuXMtX+vW1y5BKN+hflax/Llj+3k:xCRrgrPupPGwjkBRtCpQ8tOvueBKN+h3
Checks for missing Authenticode signature.
resource |
---|
3f588f605e6f2a005312b80db58f7563 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LockResource
GetTempPathA
SetPriorityClass
GetCurrentProcess
ResumeThread
SetLastError
GetVersion
GetModuleFileNameA
MoveFileA
GetCurrentProcessId
GetFileSize
VirtualAlloc
ReadFile
WriteFile
DisableThreadLibraryCalls
OpenProcess
GetVolumeInformationA
CreateFileMappingA
MapViewOfFile
WideCharToMultiByte
MultiByteToWideChar
GetPriorityClass
QueryPerformanceFrequency
QueryPerformanceCounter
SetFilePointer
OpenFileMappingA
GetWindowsDirectoryA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
GetTickCount
CreatePipe
PeekNamedPipe
LoadResource
GetLogicalDrives
GetDriveTypeA
FindNextFileA
FileTimeToSystemTime
CreateDirectoryA
ExitProcess
GetProcessTimes
GetFileAttributesA
RemoveDirectoryA
FormatMessageA
LocalFree
SetEndOfFile
GetLocaleInfoA
IsBadCodePtr
IsBadReadPtr
SetEnvironmentVariableA
CompareStringW
CompareStringA
InterlockedExchange
VirtualQuery
GetSystemInfo
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SizeofResource
FindResourceA
DeleteFileA
CopyFileA
lstrlenA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
lstrcatA
GetSystemDirectoryA
FindClose
SetFileTime
CreateFileA
FindFirstFileA
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
SetErrorMode
Sleep
CreateMutexA
lstrcpyA
TerminateThread
WaitForSingleObject
CreateThread
GetLastError
CloseHandle
UnmapViewOfFile
VirtualProtect
GetProcAddress
LoadLibraryA
SetThreadPriority
GetCurrentThread
GetThreadPriority
FreeLibrary
TerminateProcess
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
GetACP
HeapSize
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
RaiseException
RtlUnwind
GetCommandLineA
HeapReAlloc
HeapFree
HeapAlloc
RegisterClassA
CreateWindowExA
IsWindow
wsprintfA
DestroyWindow
UnregisterClassA
GetDC
mouse_event
keybd_event
SendMessageA
EndDialog
ExitWindowsEx
CloseWindow
MessageBoxA
SetTimer
GetDlgItem
GetWindowTextA
DialogBoxParamA
GetActiveWindow
KillTimer
SetWindowTextA
GetDIBits
GetObjectA
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
DeleteObject
DeleteDC
QueryServiceConfig2A
QueryServiceConfigA
EnumServicesStatusA
RegEnumKeyExA
LookupAccountSidA
GetTokenInformation
DeleteService
ControlService
OpenServiceA
QueryServiceStatus
StartServiceA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
ChangeServiceConfig2A
CreateServiceA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ShellExecuteA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
SHDeleteKeyA
StrCmpNIA
send
closesocket
gethostname
gethostbyname
WSAStartup
ioctlsocket
socket
WSAAsyncSelect
htons
connect
recv
Resorce_Get
ServiceMain
SoftWareGoIn
SoftWareTest
SoftWare_Hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ