ServiceRouteEx
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
5a0c1228a21f77a2c69dc960abe74a68.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a0c1228a21f77a2c69dc960abe74a68.dll
Resource
win10v2004-20231215-en
Target
5a0c1228a21f77a2c69dc960abe74a68
Size
32KB
MD5
5a0c1228a21f77a2c69dc960abe74a68
SHA1
fb7c8a8838e71bfcc10e82a56cbb25631812307c
SHA256
03bc9b7c66fdffab76471585f9b18a2ccd2563d4c4fbd464f7c3ff309e112539
SHA512
d42e41b68cb9f48fa81339b8b8b967db2e935c0f1a47fc51a312f91f4fb43e5cd17ee4bd382a6528b50c44161023670cb079edd5b28dd18ec24533ca70fe2eca
SSDEEP
384:LrMJzGxcYj+etCriuBBQARQketyqM+3E5KIo:/eGxYetCrFBBQARQkvEE5ro
Checks for missing Authenticode signature.
resource |
---|
5a0c1228a21f77a2c69dc960abe74a68 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
lstrcatA
VirtualProtect
CloseHandle
CreateThread
GetModuleFileNameA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
GetAdaptersInfo
strcat
strcpy
memset
strlen
memcmp
fclose
fread
fputs
fopen
strcmp
strrchr
free
_initterm
malloc
_adjust_fdiv
_strlwr
_itoa
ServiceRouteEx
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ