ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
4783a8a489e0bab95ff26fddc670f7ad.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4783a8a489e0bab95ff26fddc670f7ad.dll
Resource
win10v2004-20231222-en
Target
4783a8a489e0bab95ff26fddc670f7ad
Size
14KB
MD5
4783a8a489e0bab95ff26fddc670f7ad
SHA1
9299ec2db8d6aa16f1c03ee380a8c7f6222f7c6d
SHA256
bdcc445a6d230d82a682861c42a92ace935186becf85413d5774840c7cf6e571
SHA512
7bd7d56fd44e04ae443ed384dc6f518ff2b18d7cb08d4da56cc62546a106d34b4cc822b139b6f68881ed5d7afb052ee2b6e1ce12def85b1a03e679baeafeaa2e
SSDEEP
192:dYgwn3gxWEvH6OZP6guBBQ6PRQkhIThZ5t:an3NijhuBBQARQkhIf5
Checks for missing Authenticode signature.
resource |
---|
4783a8a489e0bab95ff26fddc670f7ad |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
memcpy
memcmp
RtlZeroMemory
gethostname
VirtualProtectEx
LeaveCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
GetCurrentDirectoryA
EnterCriticalSection
lstrcpyA
lstrcmpiA
WaitForSingleObject
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
DeleteCriticalSection
lstrcatA
lstrlenA
CreateThread
TerminateThread
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowThreadProcessId
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ