TMethodImplementationIntercept
WNetAddConnection2A
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
2571cc865fa744e0570865fce009e528aeed805722710725abda3bdf144d0fb0.dll
Resource
win7-20220331-en
Target
2571cc865fa744e0570865fce009e528aeed805722710725abda3bdf144d0fb0
Size
8.5MB
MD5
47cc8bdbe3ef5a2dc2105328c955fca0
SHA1
518788278e6ecc4bfb640f25ae4bf191c35d1f23
SHA256
2571cc865fa744e0570865fce009e528aeed805722710725abda3bdf144d0fb0
SHA512
0bf0895a23b28ce86269ea01ce74515aacb66a90b88df87d560e679dc816f347421903301cd8d4e3bbd8e38f032efbdd18280b1b77c73f846a05f01d30b593f5
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
timeGetTime
DocumentPropertiesW
ChooseFontW
ImageList_GetImageInfo
SHGetFolderPathW
MoveWindow
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
GetFileVersionInfoSizeW
SysFreeString
RegSetValueExW
NetWkstaGetInfo
strncmp
GetVersion
GetVersionExW
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
gethostbyaddr
IsEqualGUID
Pie
WTSSendMessageW
TMethodImplementationIntercept
WNetAddConnection2A
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ