ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
47eb58b8e40c579a4d8811c07d9a7050.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47eb58b8e40c579a4d8811c07d9a7050.dll
Resource
win10v2004-20231222-en
Target
47eb58b8e40c579a4d8811c07d9a7050
Size
87KB
MD5
47eb58b8e40c579a4d8811c07d9a7050
SHA1
0560c97b3ddb561723b587ad6b5c6d7eefa90f61
SHA256
2ee0bb56ee6cdd2f7744817ea9fa51b17d44b84e841da94160a6304741c09653
SHA512
deeb9872dd31f77f04bd9c90cf7215df503170a4645efa431f2ae03dd8d779262efcb057b36b02bc31758faab9b12c20d8dbb494f449b6b6a9180037d6024f0a
SSDEEP
1536:tRPTlp6JABRkte9Qp9vcA6LfRSqiJwZm5ksO0:PPr66bu9vL6bRSqGwZm5ksO0
Checks for missing Authenticode signature.
resource |
---|
47eb58b8e40c579a4d8811c07d9a7050 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileAttributesA
GetTempPathA
TerminateThread
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
GetSystemDirectoryA
FindResourceA
DeviceIoControl
LoadLibraryExA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
WriteFile
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
SetLastError
MoveFileA
GetLastError
LoadResource
SetFilePointer
ReadFile
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
InitializeCriticalSection
lstrcpyA
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
GetCurrentThreadId
LocalFree
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
CloseWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
ExitWindowsEx
IsWindow
IsWindowVisible
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
OpenDesktopA
SetWindowsHookExA
UnhookWindowsHookEx
SystemParametersInfoA
SendMessageA
keybd_event
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DeleteDC
SelectObject
GetPaletteEntries
CreateHalftonePalette
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
strrchr
_except_handler3
strncpy
realloc
atoi
wcstombs
_beginthreadex
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_strcmpi
strstr
_ftol
ceil
memmove
calloc
??3@YAXPAX@Z
gethostname
connect
getsockname
WSACleanup
WSAStartup
htons
gethostbyname
ntohs
recv
setsockopt
send
select
closesocket
socket
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
MakeSureDirectoryPathExists
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ