DestoryAntiVirus
GetDllModuleControlInit
StartShell
StartShell_A
StartShell_B
StartShell_C
StartShell_D
Static task
static1
Behavioral task
behavioral1
Sample
7f3dd6c0fe2038ffcd1433f3b387e250.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f3dd6c0fe2038ffcd1433f3b387e250.dll
Resource
win10v2004-20231215-en
Target
7f3dd6c0fe2038ffcd1433f3b387e250
Size
193KB
MD5
7f3dd6c0fe2038ffcd1433f3b387e250
SHA1
ab36d2528bdc77bcc620a566b0d7826bd3778057
SHA256
8de63e661a2e18bb24c4e2e7b1c48b97c9045a60f9c96e266e1f48277102af13
SHA512
b5bf43c6cfee966cdb853380515b59e630ced9690805400571892c2ee0b0c481c75badafe213eb4c6889b8c342556f6903500178cc3e4c7859cc6bfe46835642
SSDEEP
3072:GPjL8+i34bLipA63h6B3+UnLYZH5eo5phXLql8OQ91l2:qLTi34bLipA63h6B3+eYl555phvOQ
Checks for missing Authenticode signature.
resource |
---|
7f3dd6c0fe2038ffcd1433f3b387e250 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
htonl
sendto
closesocket
select
inet_ntoa
WSAStartup
setsockopt
send
socket
inet_addr
htons
connect
WSACleanup
gethostbyname
InternetReadFile
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
Sleep
SetEvent
WaitForSingleObject
lstrlenW
CreateThread
CreateEventW
lstrcpyW
WideCharToMultiByte
GetTickCount
GetVersionExW
InterlockedExchange
GetACP
GetLocaleInfoA
InitializeCriticalSection
DeleteCriticalSection
lstrcatW
GetProcAddress
GetModuleHandleW
GlobalFree
GlobalAlloc
CreateFileW
GetModuleFileNameW
GetModuleFileNameA
GetSystemDirectoryW
OpenFile
CloseHandle
GetLastError
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
ExitProcess
CreateProcessW
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
CopyFileW
DeleteFileW
FindClose
FindNextFileW
GetFullPathNameW
FindFirstFileW
SetCurrentDirectoryW
GetPrivateProfileStringW
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
DeviceIoControl
GetCurrentProcess
GetExitCodeThread
HeapFree
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
TerminateProcess
GetCurrentThreadId
SetFilePointer
ReadFile
DuplicateHandle
LoadLibraryA
RtlUnwind
GetCommandLineA
GetVersionExA
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
VirtualQuery
HeapDestroy
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
WriteFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
GetOEMCP
SetStdHandle
FlushFileBuffers
GetSystemInfo
SetEndOfFile
HeapAlloc
VirtualFree
HeapCreate
RegisterClassExW
ShowWindow
UpdateWindow
GetMessageW
DispatchMessageW
TranslateMessage
DefWindowProcW
PostQuitMessage
SetWindowLongW
GetClientRect
GetWindowLongW
CreateWindowExW
wsprintfW
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCreateKeyW
ChangeServiceConfigW
RegDeleteKeyW
RegOpenKeyW
RegEnumKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDeleteValueW
RegCreateKeyA
RegSetValueExA
RegOpenKeyExW
CreateServiceW
RegCloseKey
RegSetValueExW
CoGetClassObject
OleSetContainedObject
OleInitialize
VariantClear
SysAllocString
VariantInit
PathRemoveFileSpecW
SHDeleteKeyW
GetModuleFileNameExW
GetModuleBaseNameW
DestoryAntiVirus
GetDllModuleControlInit
StartShell
StartShell_A
StartShell_B
StartShell_C
StartShell_D
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ