ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
4b7341499a4fc6901c083bb25b2914bf.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b7341499a4fc6901c083bb25b2914bf.dll
Resource
win10v2004-20231215-en
Target
4b7341499a4fc6901c083bb25b2914bf
Size
19KB
MD5
4b7341499a4fc6901c083bb25b2914bf
SHA1
6ed0387c2a4f70bfbd78846d559dd1187e979024
SHA256
601b383ad831baa7a680d03f3b97ebfee5b78db5610dc94cdb20e042266e8457
SHA512
3634db231ac6ad4b273bb85ec0811dfbc74a2e4f6b6a61522e66568f14f11e8c5bf1f581f282f908fb2866240698b307c7acce04485f97ebb6ea05accf282a02
SSDEEP
192:bt5/ZuvSNwYW1QpJI7HQuFu8oiKNhuBBQ6PRQkf2D0Q8ex2DMoPoCb:btxZuvSZWlsuF8huBBQARQkfWxXeoi
Checks for missing Authenticode signature.
resource |
---|
4b7341499a4fc6901c083bb25b2914bf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
RtlZeroMemory
strcpy
memcmp
memcpy
VirtualAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteProcessMemory
VirtualQueryEx
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
ReadProcessMemory
Sleep
TerminateProcess
VirtualProtectEx
VirtualFree
GetWindowThreadProcessId
KillTimer
SetTimer
SetWindowLongA
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowLongA
GetWindowTextA
EnumWindows
wsprintfA
CallNextHookEx
CallWindowProcA
send
gethostname
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ