ServiceRouteExA
StartServiceEx
StopServiceEx
UnHookAPI
Static task
static1
Behavioral task
behavioral1
Sample
3fab7374bb2c8f531f1403fb1f207e97.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3fab7374bb2c8f531f1403fb1f207e97.dll
Resource
win10v2004-20231222-en
Target
3fab7374bb2c8f531f1403fb1f207e97
Size
14KB
MD5
3fab7374bb2c8f531f1403fb1f207e97
SHA1
9afc52473b0c5bcc35df2effc6181c14be42b35c
SHA256
3bb7c3af732f48bf53e4b76593d16b39a8a7ad951a9e3b98a901da03b944597a
SHA512
8f85e153f4329a9f19d6fb8a78ca6998bf39146e161fcf7bdbab2d15fc966970764db3b2f3e30ba5dbe9bb9e0901540c60111794935c3ae56ba19004efe32c84
SSDEEP
192:ryJ9c4WBWiQMoL0IBzUra1xkuBBQ6PRQkzTVxlum:C9oBzQuuiuBBQARQkXVx
Checks for missing Authenticode signature.
resource |
---|
3fab7374bb2c8f531f1403fb1f207e97 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
LoadLibraryA
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
WaitForSingleObject
TerminateThread
Sleep
LeaveCriticalSection
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcatA
ReadFile
VirtualProtectEx
InitializeCriticalSection
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
UnHookAPI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ