DescryptoData
ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
b4bbdc1b3d888dc0b0ba4dac58ee8a1c.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b4bbdc1b3d888dc0b0ba4dac58ee8a1c.dll
Resource
win10v2004-20240226-en
Target
b4bbdc1b3d888dc0b0ba4dac58ee8a1c
Size
19KB
MD5
b4bbdc1b3d888dc0b0ba4dac58ee8a1c
SHA1
d88e8b36679ce137801c69bf00f544bc66c838e1
SHA256
bdcaf4d6c93b2332516634a21c0a9feba687b03ed28af6b1d651db581c6e9fe8
SHA512
f0166ad9060b40c9fb4162e2684462d5fd579321d3e0ef1a292598974e56c9c79f9eaa42a58da872ad7ee16c14597b65766579716760df637d11d460ae22bd6f
SSDEEP
192:AqlYQqPtrN7alaKFe1ifB07pQiu8Di+XxuBBQ6PRQkf2D48ZDix2DMohix6b:VOQqPf7aTFLWKiJxuBBQARQkfdxXwMa
Checks for missing Authenticode signature.
resource |
---|
b4bbdc1b3d888dc0b0ba4dac58ee8a1c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
RtlZeroMemory
strcpy
memcmp
memcpy
VirtualAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteProcessMemory
VirtualQueryEx
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
ReadProcessMemory
Sleep
TerminateProcess
VirtualProtectEx
VirtualFree
GetWindowThreadProcessId
KillTimer
SetTimer
SetWindowLongA
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowLongA
GetWindowTextA
EnumWindows
wsprintfA
CallNextHookEx
CallWindowProcA
send
gethostname
DescryptoData
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ