ServiceRouteEx
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
53cd0a90cd041c9e9ffbdae6e922d56e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53cd0a90cd041c9e9ffbdae6e922d56e.dll
Resource
win10v2004-20231215-en
Target
53cd0a90cd041c9e9ffbdae6e922d56e
Size
28KB
MD5
53cd0a90cd041c9e9ffbdae6e922d56e
SHA1
721f1dae5e2e2d6ccb137c6b5e45ca1550369493
SHA256
31df806e069c0f978b5c2234c0d35da915fdf82153f6aadd548be2064f358c04
SHA512
9149759c4fc198e1f1a22cd53cdceedcd47ab3fdbdcab691e5958d9653be63712075758c4a13a5157120a7a65623f90f2a4da1369125246fa79bddd435f1f8b9
SSDEEP
384:e4NrAIXeRIRcBMSmnuBBQARQkup9Ntvn3E5K7:e4OIXec0MSfBBQARQk49Nt/E5
Checks for missing Authenticode signature.
resource |
---|
53cd0a90cd041c9e9ffbdae6e922d56e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
lstrcatA
VirtualProtect
CloseHandle
CreateThread
GetModuleFileNameA
SetWindowsHookExA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
GetAdaptersInfo
_adjust_fdiv
malloc
_initterm
free
strrchr
strcmp
fopen
fputs
fread
fclose
memcmp
strlen
memset
strcpy
strcat
_strlwr
_itoa
ServiceRouteEx
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ