CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
Static task
static1
Behavioral task
behavioral1
Sample
9b6f84ad83efd3a206496374464a3308.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b6f84ad83efd3a206496374464a3308.dll
Resource
win10v2004-20231222-en
Target
9b6f84ad83efd3a206496374464a3308
Size
30KB
MD5
9b6f84ad83efd3a206496374464a3308
SHA1
e314715d145751914088470bfd4ad4a17987956c
SHA256
4d1136f444cc58c8857bc21be46c54be45c3b343d868e4f7dbc5bb84f1969714
SHA512
8a066d5ba8531042c7cbded27f8fd04c49fa12362ed98311de44ea8700df0b90d3623973fc7f90d7117f5a21ebb4ca324d5300116cd391bdc9cb4a178d7dcfca
SSDEEP
384:lmgp3LpZmUfctUiFgywonYLOZc7J+OWOe0g8Oxu/HVn5/vO:lp5f2UiFgkYTJ+OWOo8OwPV5/vO
Checks for missing Authenticode signature.
resource |
---|
9b6f84ad83efd3a206496374464a3308 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
LoadResource
SizeofResource
GetModuleHandleA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
MultiByteToWideChar
SetFileTime
GetFileTime
WaitForSingleObject
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
FindFirstFileA
GetModuleFileNameA
wsprintfA
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
OpenProcessToken
StrStrIA
PathFileExistsA
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ