ServiceRouteEx
StATYU
StOAYU
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
8ec5b36fc4a2c5523de1c42a6cf33287.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ec5b36fc4a2c5523de1c42a6cf33287.dll
Resource
win10v2004-20231215-en
Target
8ec5b36fc4a2c5523de1c42a6cf33287
Size
24KB
MD5
8ec5b36fc4a2c5523de1c42a6cf33287
SHA1
70f4b8f21822746dcedd6bc3a138bad89b069aab
SHA256
8702b520386ebd6ba9c30a7854b88591e12f5a478134773b475e5e2c19e65130
SHA512
22afc520d1149c82120e5411f776384b9a43e23add730b4b9807d53cdcd25192364bc5d14aaefb435ad3568f315ada97bc172590b9118406104bcf6347da0770
SSDEEP
384:1HoE09gYd8j8HnuBBQARQkBXQi7DosTI0+:1HoE0eYdy8OBBQARQk2i7D8z
Checks for missing Authenticode signature.
resource |
---|
8ec5b36fc4a2c5523de1c42a6cf33287 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
lstrcatA
GetPrivateProfileStringA
VirtualProtect
CloseHandle
CreateThread
GetModuleFileNameA
SetWindowsHookExA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
strrchr
strcmp
fopen
fputs
fread
fclose
memcmp
strlen
memset
strcpy
strcat
_strlwr
_itoa
ServiceRouteEx
StATYU
StOAYU
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ