ServiceRouteEx
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
ccc6dbd6fc22f3d6ed787fb1d80db3d5.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ccc6dbd6fc22f3d6ed787fb1d80db3d5.dll
Resource
win10v2004-20240226-en
Target
ccc6dbd6fc22f3d6ed787fb1d80db3d5
Size
17KB
MD5
ccc6dbd6fc22f3d6ed787fb1d80db3d5
SHA1
06561b99b2ba55cde48dbe032c2f386191cb612c
SHA256
e9917f4bfc85782c3229cb0bb4f830ce7ec113ed1abf46e9204a0143a1491bf7
SHA512
fc7eff32edf697106eb87d2253250dce4c089b3c373d949d59fcbf2ff84ee864d7b46902777a14594e0b0a340444bd6162dba50ced33240855b7d2ec11d6752c
SSDEEP
192:ih5wMMWXPoZrEpN4uPgC1nunNk5OuBBQ6PRQkDSpkvGkCS3LsA:iTwcXwOpN4EHu+5OuBBQARQkD1GkCS3
Checks for missing Authenticode signature.
resource |
---|
ccc6dbd6fc22f3d6ed787fb1d80db3d5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strstr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
CreateThread
WritePrivateProfileStringA
WaitForSingleObject
TerminateThread
SystemTimeToFileTime
Sleep
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetPrivateProfileIntA
IsBadReadPtr
lstrcpynA
lstrcpyA
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
ReadFile
VirtualProtectEx
lstrcatA
lstrlenA
GetLocalTime
DeleteCriticalSection
EnterCriticalSection
ExitProcess
lstrcmpiA
wsprintfA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
GetKeyboardState
MapVirtualKeyA
SetTimer
ToAscii
ServiceRouteEx
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ