CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
Behavioral task
behavioral1
Sample
be47deba8b7f02d842a155c7e7e85a5eadddebfc59bef40c18f7f29e5f842614.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be47deba8b7f02d842a155c7e7e85a5eadddebfc59bef40c18f7f29e5f842614.exe
Resource
win10v2004-20220812-en
Target
be47deba8b7f02d842a155c7e7e85a5eadddebfc59bef40c18f7f29e5f842614
Size
111KB
MD5
281858269b7216b619f1b1917364e7c7
SHA1
521dbaf17b6ae0f2b191a732d54457984b3deed8
SHA256
be47deba8b7f02d842a155c7e7e85a5eadddebfc59bef40c18f7f29e5f842614
SHA512
e483c94ed3cd186fa27d9280831522d2d3c5869832748a7d03eb2fe02f5ce50e180f8b30349fa169622232978dcfa8908e8f9d74563177f71438a144fd6e77bc
SSDEEP
3072:tDBBShpM7NewQgU2J5d+4/0J/VssPZ93k:fB57NfUA5d+4o/Z3k
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcatA
MultiByteToWideChar
lstrcmpiA
GetProcAddress
CopyFileA
LoadLibraryA
SetNamedPipeHandleState
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
VirtualProtect
GetVersionExA
GetTempPathA
lstrcpyW
DeleteFileA
lstrcpyA
GetFileSize
FindResourceA
FreeResource
SetEndOfFile
GetSystemDirectoryA
LoadResource
GetCurrentProcess
Process32First
GetSystemTimeAsFileTime
SizeofResource
GetExitCodeProcess
CreateProcessA
Process32Next
LockResource
CreateToolhelp32Snapshot
LocalFree
SetEvent
ExitThread
lstrlenW
OpenEventA
DuplicateHandle
GetCurrentProcessId
GetSystemTime
CreateThread
CreateEventA
Sleep
OpenProcess
GetCommandLineA
WaitForSingleObject
VirtualQuery
lstrlenA
ExitProcess
CloseHandle
DeviceIoControl
VirtualAlloc
GetLastError
ReadFile
WriteFile
VirtualFree
SetFilePointer
FreeLibrary
CreateFileA
SendMessageA
MessageBoxA
PostMessageA
FindWindowA
wsprintfA
wsprintfW
OpenProcessToken
RegOpenKeyA
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
CreateServiceA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
SetEntriesInAclA
SetNamedSecurityInfoA
LookupPrivilegeValueA
BuildExplicitAccessWithNameA
AdjustTokenPrivileges
GetNamedSecurityInfoA
RegCloseKey
ShellExecuteA
strtoul
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
_except_handler3
strrchr
_access
memcpy
memset
strstr
SHDeleteValueA
PathFileExistsA
SHDeleteKeyA
SHGetValueA
SHSetValueA
GetModuleFileNameExA
CoCreateInstance
CoGetMalloc
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
GradientFill
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ