_GetFunctionAddr@20
_NewHook@12
_OutputConsole@4
_OutputDWORD@4
_OutputRegister@4
_RegisterEngineType@4
_RegisterHookName@8
_RemoveHook@4
_SwitchTrigger@4
Static task
static1
Behavioral task
behavioral1
Sample
ITH.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ITH.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ITH.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ITH.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ITH_engine.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ITH_engine.dll
Resource
win10v2004-20231222-en
Target
670d4dd5b5e3d95fd8f8adf2af899828
Size
59KB
MD5
670d4dd5b5e3d95fd8f8adf2af899828
SHA1
7c9c535dbe73c2897249156d71d70db0ccce177c
SHA256
28d30487508fb8c5d4f1b993440dd81b8b18c21de571b44f73ec3fd345e6ba8f
SHA512
bf30cdddc54230b85c0f91b3ccd99607559fe3949535220179725f5a5d92e4a1128e5f26e44ca7e50c93b9334504bf007d61ebd497f01695e89be06004defc13
SSDEEP
1536:MDzjjHAAJP+6WyPhze74l5pgoAMVtDmI4kWI:M/HDXWyJZpUMbDmI1
Checks for missing Authenticode signature.
resource |
---|
unpack001/ITH.dll |
unpack001/ITH.exe |
unpack001/ITH_engine.dll |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wcsrchr
_wcslwr
_wcsicmp
swprintf
_stricmp
memcpy
memset
NtResumeThread
NtSetEvent
NtQuerySystemTime
NtTerminateThread
RtlCreateHeap
NtCreateThread
NtAllocateVirtualMemory
NlsAnsiCodePage
NtOpenEvent
NtOpenDirectoryObject
RtlSetHeapInformation
RtlTimeToTimeFields
NtCreateEvent
NtCreateMutant
NtGetContextThread
NtOpenFile
NtCreateSection
NtQueryVirtualMemory
NtFlushBuffersFile
NtFlushInstructionCache
NtWriteVirtualMemory
NtProtectVirtualMemory
NtReadFile
NtReleaseMutant
NtCreateFile
NtClearEvent
RtlInitUnicodeString
NtDelayExecution
RtlAllocateHeap
NtClose
NtWaitForSingleObject
NtUnmapViewOfSection
RtlFreeHeap
NtMapViewOfSection
NtWriteFile
LdrDisableThreadCalloutsForDll
RtlDestroyHeap
DrawTextW
DrawTextA
DrawTextExW
DrawTextExA
GetCharABCWidthsW
TextOutA
ExtTextOutA
GetGlyphOutlineW
GetCharABCWidthsA
ExtTextOutW
GetTextExtentPoint32A
GetTextExtentPoint32W
GetGlyphOutlineA
TextOutW
_GetFunctionAddr@20
_NewHook@12
_OutputConsole@4
_OutputDWORD@4
_OutputRegister@4
_RegisterEngineType@4
_RegisterHookName@8
_RemoveHook@4
_SwitchTrigger@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memset
wcsstr
memcpy
strstr
sscanf
sprintf
_wcsicmp
wcsrchr
_wcslwr
swprintf
swscanf
wcschr
NtCreateSection
NtOpenFile
NtGetContextThread
NtCreateMutant
NtCreateEvent
RtlTimeToTimeFields
RtlSetHeapInformation
NtDelayExecution
NtOpenDirectoryObject
NtCreateFile
NlsAnsiCodePage
RtlDestroyHeap
NtCreateThread
NtOpenMutant
RtlCreateHeap
NtProtectVirtualMemory
NtUnmapViewOfSection
NtMapViewOfSection
NtReleaseMutant
NtCreateSemaphore
NtCreateNamedPipeFile
NtFsControlFile
RtlInitUnicodeString
NtReleaseSemaphore
NtReadFile
NtAdjustPrivilegesToken
NtOpenProcessToken
NtClearEvent
NtQueryInformationFile
NtTerminateProcess
NtWriteFile
NtQuerySystemTime
NtWriteVirtualMemory
NtSuspendThread
NtOpenProcess
NtQueryVirtualMemory
NtQueryPerformanceCounter
RtlAllocateHeap
NtReadVirtualMemory
NtClose
NtOpenThread
NtWaitForSingleObject
NtQueryInformationProcess
RtlFreeHeap
NtQueryInformationThread
NtQuerySystemInformation
LdrUnloadDll
NtTerminateThread
NtSetEvent
NtResumeThread
NtAllocateVirtualMemory
NtFreeVirtualMemory
ord17
LoadLibraryW
InitializeCriticalSection
GlobalAlloc
GlobalUnlock
CreateProcessW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEnvironmentVariableW
GlobalLock
GetWindowTextLengthW
PostQuitMessage
GetKeyState
GetFocus
DialogBoxParamW
SetFocus
RegisterClassExW
LoadIconW
GetDlgItem
SetWindowLongW
EndDialog
SetWindowPos
GetCursorPos
IsDlgButtonChecked
CreateDialogParamW
CreateWindowExW
MessageBoxW
GetDlgItemTextW
SetDlgItemTextW
UpdateWindow
EnableWindow
SetWindowTextW
GetDialogBaseUnits
CallWindowProcW
DefWindowProcW
MoveWindow
CloseClipboard
SetTimer
KillTimer
GetWindowTextW
EmptyClipboard
OpenClipboard
SendMessageW
SetClipboardData
GetWindowRect
GetMessageW
SetForegroundWindow
FindWindowW
TranslateMessage
ShowWindow
IsWindow
DispatchMessageW
CheckDlgButton
CreateFontW
GetSaveFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_wcsicmp
wcsrchr
memset
wcsstr
_wcslwr
swprintf
strstr
sscanf
memcpy
_OutputDWORD@4
_OutputConsole@4
_NewHook@12
_RegisterEngineType@4
_GetFunctionAddr@20
_SwitchTrigger@4
NtQueryDirectoryFile
NtUnmapViewOfSection
NtCreateFile
NtOpenDirectoryObject
RtlSetHeapInformation
RtlTimeToTimeFields
NtCreateEvent
NtQueryVirtualMemory
NtCreateMutant
NtOpenFile
NtCreateSection
NlsAnsiCodePage
RtlDestroyHeap
RtlInitUnicodeString
NtMapViewOfSection
RtlCreateHeap
NtQuerySystemTime
NtReadFile
NtClose
NtClearEvent
NtSetEvent
LdrDisableThreadCalloutsForDll
MD5Init
MD5Update
MD5Final
DrawTextExW
DrawTextExA
GetTextExtentPoint32W
GetGlyphOutlineA
GetTextExtentPoint32A
GetTextMetricsA
ExtTextOutA
TextOutA
GetGlyphOutlineW
DetermineEngineType
IdentifyEngine
InsertDynamicHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ