ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
4799a8b3a65d425a45b5fbce77057fc4.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4799a8b3a65d425a45b5fbce77057fc4.dll
Resource
win10v2004-20231222-en
Target
4799a8b3a65d425a45b5fbce77057fc4
Size
16KB
MD5
4799a8b3a65d425a45b5fbce77057fc4
SHA1
983cb4575cda95673acddb3b041fb16dd2dab255
SHA256
ce5e0494210ce25bcae7250c12befeef6836da07f0be4ff439aa564b3c9edc66
SHA512
da41b6c606f8eb36a925ac85ae99009d313d81b5d93906c17f40b6bae06e058f7ecfaed37e417ad21a2edfb2ed37ee4fa421368c44d0ff616775a65ec5315723
SSDEEP
192:4asUMGrvIZXbPPFRX2MaMs6BfsQuBBQ6PRQk66kwvBa6s3lNAYbpzC:Fs0rwJPFYvWEQuBBQARQk6uBaX373
Checks for missing Authenticode signature.
resource |
---|
4799a8b3a65d425a45b5fbce77057fc4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strstr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
WritePrivateProfileStringA
WaitForSingleObject
TerminateThread
Sleep
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetPrivateProfileIntA
ExitProcess
IsBadReadPtr
lstrcpynA
lstrcpyA
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
VirtualProtectEx
lstrcatA
lstrlenA
EnterCriticalSection
CreateThread
DeleteCriticalSection
lstrcmpiA
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
GetKeyboardState
MapVirtualKeyA
SetTimer
ToAscii
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ