ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
5389a13d417bc7e9bf83c2ae13c56f08.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5389a13d417bc7e9bf83c2ae13c56f08.dll
Resource
win10v2004-20231215-en
Target
5389a13d417bc7e9bf83c2ae13c56f08
Size
16KB
MD5
5389a13d417bc7e9bf83c2ae13c56f08
SHA1
34545611dd7187265f9eebfffd4e673bf6e727dc
SHA256
4a7f3286c3c67c4931d481fb63f4ddbad452079c84d374129e6afe3f2eaca088
SHA512
607d2575f19a888364a4525643a7da79e9ff941107895f354a796a22ecde8647ad9bf654375a9f775e1b3ec27dbe69117011fa32a99c103ffc08b8070bc55797
SSDEEP
384:fZ/XwTJMrmqOSQEaib8fuBBQARQkLDOSqJeYq:fZvQnq/ZaibDBBQARQkA
Checks for missing Authenticode signature.
resource |
---|
5389a13d417bc7e9bf83c2ae13c56f08 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_strupr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
LoadLibraryA
GetSystemDirectoryA
GetPrivateProfileStringA
CreateThread
lstrlenA
WritePrivateProfileStringA
IsBadReadPtr
ExitProcess
lstrcpyA
lstrcmpiA
lstrcmpA
WaitForSingleObject
TerminateThread
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcatA
ReadFile
VirtualProtectEx
Sleep
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ