DllUpdate
Install
MainThread
ServiceMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
236e33c9a4b9a78a73ad829674a401a0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
236e33c9a4b9a78a73ad829674a401a0N.dll
Resource
win10v2004-20240802-en
Target
236e33c9a4b9a78a73ad829674a401a0N.exe
Size
51KB
MD5
236e33c9a4b9a78a73ad829674a401a0
SHA1
9ca9db50577c88d42dcef47418c4ca441e6573d6
SHA256
07cc855fed01ad675ef00fd07901f905a62aa0b107a30873839539f9f0d4c558
SHA512
646c6a455ee9c8d4d085879b67ad2e3c8c057448e638c3011cd62f1e98ba554d4ea2c067352dcaf28691961979f8ba41d926d19f96f1a713a4c4a2d068e272c0
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezJsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBmpMC6H
Checks for missing Authenticode signature.
resource |
---|
236e33c9a4b9a78a73ad829674a401a0N.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
ReadFile
GetFileAttributesA
LocalFree
LocalSize
LocalAlloc
WinExec
lstrcatA
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
WaitForSingleObject
GetCurrentDirectoryA
FreeConsole
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
lstrcmpiA
SetEvent
CreateEventA
VirtualAlloc
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
lstrcpyA
lstrlenA
GetLastError
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
EncodePointer
DecodePointer
VirtualFree
wsprintfA
GetSystemMetrics
ChangeDisplaySettingsA
GetLastInputInfo
GetWindowThreadProcessId
RegSetValueExA
RegOpenKeyExA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
RegCloseKey
SHGetSpecialFolderPathA
VariantInit
VariantClear
??2@YAPAXI@Z
memcpy
_CxxThrowException
memset
_local_unwind4
strrchr
strstr
??_U@YAPAXI@Z
strncpy
??_V@YAXPAX@Z
free
malloc
printf
rand
atoi
strcspn
wcstombs
realloc
_errno
strchr
_beginthreadex
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
??3@YAXPAX@Z
ceil
_strupr
_stricmp
__CxxFrameHandler3
_strnicmp
recvfrom
getpeername
accept
listen
htons
getsockname
inet_addr
gethostbyname
closesocket
WSAStartup
connect
WSACleanup
ntohs
inet_ntoa
select
__WSAFDIsSet
recv
send
sendto
socket
bind
GetIfTable
GetAdaptersInfo
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ