CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
Static task
static1
Behavioral task
behavioral1
Sample
b7f0018b6c09f97a8a20528a4c60074e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7f0018b6c09f97a8a20528a4c60074e.dll
Resource
win10v2004-20240226-en
Target
b7f0018b6c09f97a8a20528a4c60074e
Size
27KB
MD5
b7f0018b6c09f97a8a20528a4c60074e
SHA1
93de8fc7e74d63d5ca3d3d6b6faa760a30520e87
SHA256
a857b432b0447e95afe51d1a2a70df2ddec6e82a2b43eb00a6cc3d6ab9dfa329
SHA512
3b22e3672406df51a68f05dc4dd65e1840e2d6d4fc1041855f8305f393682eb8013867946f77186bb5ca4e0f95a05d34b39d34a07c11836da545e0a2a6ed5e61
SSDEEP
384:WaQpTURBjOpfctUiZr+JJOqnpeBtPw/fqiHKGEu7Pwyv:WaQxOKpf2UigC4HqmKGpDf
Checks for missing Authenticode signature.
resource |
---|
b7f0018b6c09f97a8a20528a4c60074e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
LoadResource
SizeofResource
GetModuleHandleA
lstrlenA
GetSystemDirectoryA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
WaitForSingleObject
MultiByteToWideChar
SetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
GetFileTime
LoadLibraryA
GetProcAddress
FindFirstFileA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
PathFileExistsA
StrStrIA
strcat
strcpy
strstr
strncat
strlen
memset
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
_abcdef@16
abcdef
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ