C:\Users\AorSat001\Desktop\Trojan\x64\Release\SvcHostDemo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9.dll
Resource
win10v2004-20240508-en
General
-
Target
a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9
-
Size
24KB
-
MD5
3a5465b645517efe423d7f495db85d26
-
SHA1
92d9a422d88d0702334b8e9e3122b2e3dacdab77
-
SHA256
a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9
-
SHA512
e84ddaae2a80bd11f025c730f188233e38cadfcbe92d20065775a9b12cd4eb7dd6a6aa333714cfa1b4b983471b0fa47196aedd726919d876beae5081a37740e0
-
SSDEEP
384:oXHdSTofwUXJR193S5KWgXnSYrQJdx6ePCiqoGfUlBpupHA99G2iIKqQbASHYEFd:cST6HXJR193S5KWOUPCJ87pYHnoctHPl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9
Files
-
a59970ebc1a3766896adfc98729d43dde203de5798b6ba2a19fe59948df79db9.dll windows:6 windows x64 arch:x64
28673546163d137ee160cbfa3708152c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
VirtualProtectEx
GetProcAddress
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
GetExitCodeProcess
Process32First
LoadLibraryA
OpenEventW
OpenProcess
CreateToolhelp32Snapshot
Process32Next
CreateThread
RtlLookupFunctionEntry
GetLastError
Sleep
GetModuleHandleA
RtlAddFunctionTable
GetCurrentProcess
WriteProcessMemory
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
RtlCaptureContext
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
SetServiceStatus
OpenProcessToken
RegisterServiceCtrlHandlerExW
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
ws2_32
WSAGetLastError
connect
socket
recv
htons
send
WSAStartup
closesocket
WSAStringToAddressA
WSACleanup
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
__std_exception_copy
memset
__C_specific_handler
__std_exception_destroy
__std_type_info_destroy_list
memchr
memcpy
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
__stdio_common_vfprintf
__acrt_iob_func
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
api-ms-win-crt-runtime-l1-1-0
_errno
_invalid_parameter_noinfo_noreturn
_initterm
_initterm_e
_seh_filter_dll
_cexit
_execute_onexit_table
system
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-string-l1-1-0
_stricmp
Exports
Exports
ServiceMain
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ