StartHook
StopHook
send_en
Behavioral task
behavioral1
Sample
d5c9a9c0e90998482dd0765500b05c5ae2f141386b9beb75dce55f93091da1fd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5c9a9c0e90998482dd0765500b05c5ae2f141386b9beb75dce55f93091da1fd.dll
Resource
win10v2004-20220901-en
Target
d5c9a9c0e90998482dd0765500b05c5ae2f141386b9beb75dce55f93091da1fd
Size
914KB
MD5
6ce97c599dd71c2043784e8f73b01700
SHA1
0b1233678a5d09edfe52d28eaa28264ace03ce32
SHA256
d5c9a9c0e90998482dd0765500b05c5ae2f141386b9beb75dce55f93091da1fd
SHA512
5edd612b20044ecd9ac1db0956679ea37e5094b965480ddf836a0533d8e6992bc5e22ceb1fbc025f7e7bcc648fbbc5ba40d47d317590ba58d12adb02414b56fd
SSDEEP
24576:bSi6klCSZxtLZ6t+tLy/dvrd3UeUycxnru4t:f6kQ1kudvrd3UemxC4t
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalFlags
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
RaiseException
RtlUnwind
HeapFree
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStartupInfoA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFileTime
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetSystemDirectoryA
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
FileTimeToSystemTime
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalAddAtomA
CreateEventA
SuspendThread
TerminateThread
SetEvent
ResumeThread
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GetModuleFileNameA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
GetFileSize
GetFileType
GlobalAlloc
GlobalFree
LoadLibraryA
GetProcAddress
lstrcatA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
OpenMutexA
ReleaseMutex
OpenFileMappingA
SetCurrentDirectoryA
GetCurrentProcessId
lstrlenW
MultiByteToWideChar
WriteProcessMemory
VirtualProtect
FindFirstChangeNotificationA
WaitForSingleObject
FindNextChangeNotification
Sleep
FindCloseChangeNotification
GetCurrentProcess
EnterCriticalSection
CreateThread
SetFilePointer
ReadFile
CreateFileA
CreateFileMappingA
GetLastError
MapViewOfFile
FindResourceA
LoadResource
LockResource
SizeofResource
FreeResource
lstrlenA
CloseHandle
UnmapViewOfFile
FreeEnvironmentStringsA
WideCharToMultiByte
DestroyMenu
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
DestroyWindow
GetWindowRect
GetDlgItem
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
ExitWindowsEx
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
RegisterClassExA
wsprintfA
PostQuitMessage
SetForegroundWindow
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
StrToIntW
StrToIntA
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
WSASetLastError
WSAStartup
gethostbyname
WSACleanup
htons
getpeername
GetMappedFileNameA
GetModuleInformation
WSCEnumProtocols
WSCGetProviderPath
ImageDirectoryEntryToData
StartHook
StopHook
send_en
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE