DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Sasfis.10754.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Win32.Sasfis.10754.dll
Resource
win10v2004-20240226-en
Target
SecuriteInfo.com.Trojan.Win32.Sasfis.10754.30850
Size
1.1MB
MD5
67744c17a1bac3a3aee40728c0200594
SHA1
b866296734ed09619814860511653196fb1a2645
SHA256
62a2df68241dec61d65d48e3e762baf66c2c1a998e374f65e1951736b8256dcf
SHA512
dc30a5e1d7fe4a7c589f2cab07c347ad1c8678d73537e741f4a6a1760b97a4483ce5726a53c7e2189158ff01006a3a2fd76200c2747ff7db0c5afd0be8e3af3b
SSDEEP
3072:4bDSs7c2QPmum//eMbnzIBMYdrfLdxKXzg2rZCP1q+5BXRoI8KalXS22SqU6R517:D7RPmum/2Mbb6Ra9Mx6yaNV8xeI
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Trojan.Win32.Sasfis.10754.30850 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
?ConvertToPureFile@FS@@YA?AVCTXStringW@@PB_W@Z
?RawCreateGFElementByXtml@GF@Util@@YAJPA_WPAPAUIGFElement@@PAU3@0H@Z
SetWindowTextW
LPtoDP
RegCreateKeyExW
DragAcceptFiles
CoCreateInstance
OleCreatePropertyFrame
?end@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV?$_String_const_iterator@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@2@XZ
?IsValidEmail@@YAHPB_W@Z
??3@YAXPAX@Z
??1CHttpDowndExports@@QAE@XZ
WinVerifyTrust
CryptMsgClose
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE