ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
7da6fba658baebe8091728f1d687bf2c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7da6fba658baebe8091728f1d687bf2c.dll
Resource
win10v2004-20231215-en
Target
7da6fba658baebe8091728f1d687bf2c
Size
17KB
MD5
7da6fba658baebe8091728f1d687bf2c
SHA1
deb813cd61d567403804ab957b1f52ef807de8f7
SHA256
55be590da6724bc9b4e2793d5a2c35005873e91bd87172723ca061864aec1d4f
SHA512
4339ac70320f07abb8ccbeaa67c15f39876f0ad1cbd234276305781bbca21026b0db42706e97b6fa8ab9a437e825d86074b7a7c4ec571a325cf5415ec8bf8d9d
SSDEEP
192:fxPGkfAps4J7QZHlgUTp1RDyYEecs+uBBQ6PRQkAlPn8H7l2wvmD:5+kopR4Tp15Cecs+uBBQARQkAlPn8Hs
Checks for missing Authenticode signature.
resource |
---|
7da6fba658baebe8091728f1d687bf2c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
closesocket
gethostname
InternetReadFile
InternetOpenA
InternetCloseHandle
VirtualAlloc
GetSystemDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetCurrentDirectoryA
CreateThread
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcmpA
lstrcpynA
lstrcpyA
lstrcmpiA
WritePrivateProfileStringA
WaitForSingleObject
TerminateThread
Sleep
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
lstrcatA
VirtualFree
VirtualProtectEx
IsBadReadPtr
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
SetTimer
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ