CancelDll
LoadDll
Behavioral task
behavioral1
Sample
3a2cc461c177360f6099f24f24d591b37f60d87f1a4b2e440de3dd41f18cc7a1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a2cc461c177360f6099f24f24d591b37f60d87f1a4b2e440de3dd41f18cc7a1.dll
Resource
win10v2004-20220901-en
Target
3a2cc461c177360f6099f24f24d591b37f60d87f1a4b2e440de3dd41f18cc7a1
Size
83KB
MD5
53dc0d550a8752ada703457f6da648f8
SHA1
66a4e0c4e1b248dd4184427d9f8655b6c69715ee
SHA256
3a2cc461c177360f6099f24f24d591b37f60d87f1a4b2e440de3dd41f18cc7a1
SHA512
4cf65c4fb6d0adb87c3bf7a32409da130f332c5ec1b90925d5d34015ca386dfbb8a466a6d007bb1f5e5726b89d6082a7e843dd4a0b70f32c419d277f6f327df1
SSDEEP
1536:Axxum8ensPyi5vyWOJ7DPFl/th2lCCZpGSf5Ryn0gfFcFvHZ1V:ATumL+yiKL7ralPHZq0vFvZH
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
Module32Next
Module32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
WideCharToMultiByte
GetPrivateProfileStringA
GetFileSize
CreateFileA
GetModuleHandleA
CreateThread
SetFilePointer
HeapAlloc
GetProcessHeap
OutputDebugStringA
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
ReadFile
FreeLibrary
GetKeyboardState
GetDC
GetWindowRect
wvsprintfA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
GetClassNameW
wsprintfA
SetWindowsHookExA
ToAscii
GetWindowThreadProcessId
AttachThreadInput
GetFocus
FindWindowA
GetWindow
DeleteUrlCacheEntry
URLDownloadToFileA
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
wcslen
_strcmpi
time
srand
wcscpy
wcsstr
exit
printf
rand
strstr
strrchr
strncpy
malloc
_stricmp
tolower
_vsnprintf
_ltoa
_strupr
wcsncat
memset
sprintf
strcpy
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
memcpy
free
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ