ServiceRouteEx
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
cded63dffeb57e84fc8f394a2908ad30.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cded63dffeb57e84fc8f394a2908ad30.dll
Resource
win10v2004-20240226-en
Target
cded63dffeb57e84fc8f394a2908ad30
Size
13KB
MD5
cded63dffeb57e84fc8f394a2908ad30
SHA1
1c2d20a6df5514456bb5e68f9e7c0344fe5fd5dc
SHA256
ec625743781d492810c1dee4e1831efa75f59cd5cad7a9336e3381287ca62aae
SHA512
c19e3528e8211434cb958c144bb28b35163b9ef2200cb416517687e43ba112ce8bef5f4cd8df289e55db90a6e90facdfe37c06915b67a34e1430bbaa4eaf4d3b
SSDEEP
192:G76sWNBbGXkvnqxK+MqHqWuBBQ6PRQkNmAIiUWfer3:46BNIXx5M1WuBBQARQkHIiUmU
Checks for missing Authenticode signature.
resource |
---|
cded63dffeb57e84fc8f394a2908ad30 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strstr
strlen
memcpy
memcmp
RtlZeroMemory
gethostname
GlobalAlloc
VirtualProtectEx
ReadFile
LoadLibraryA
GlobalFree
lstrcmpA
IsBadReadPtr
lstrcpynA
lstrcpyA
lstrcmpiA
lstrlenA
CloseHandle
CreateFileA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
lstrcatA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteEx
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ