StartHook
StopHook
send_en
Behavioral task
behavioral1
Sample
78af3903e1e462e378529d96f3076c98e77dae5851319de4de308947f576c688.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78af3903e1e462e378529d96f3076c98e77dae5851319de4de308947f576c688.dll
Resource
win10v2004-20220812-en
Target
78af3903e1e462e378529d96f3076c98e77dae5851319de4de308947f576c688
Size
632KB
MD5
a3a72dc3bdc78a0e8217b709d86ddac1
SHA1
a2f834d27ed87324bdad51ad9633933af710ec86
SHA256
78af3903e1e462e378529d96f3076c98e77dae5851319de4de308947f576c688
SHA512
226a68489adb58af50c44cbaf2afeb7968d1e7289f767f06b8a686308d6393a54d8e1435a1df9231e8ca715316feec0fe7c4b7d2410f38acf18d07954fd3ccba
SSDEEP
12288:aC19qxlmeq+ig11gL36acSDBsxm2t54SI+leq36YJQRi9sFZdas/3SR:XO1236t8Bsxm2LxI+tLy/dvy
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetPrivateProfileStringA
RaiseException
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
VirtualAlloc
HeapReAlloc
SetStdHandle
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
UnmapViewOfFile
CloseHandle
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetTempPathA
GetSystemDirectoryA
lstrlenA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
GetLastError
CreateFileMappingA
CreateFileA
ReadFile
SetFilePointer
OpenFileMappingA
CreateThread
EnterCriticalSection
GetCurrentProcess
FindCloseChangeNotification
Sleep
FindNextChangeNotification
WaitForSingleObject
FindFirstChangeNotificationA
VirtualProtect
WriteProcessMemory
MultiByteToWideChar
lstrlenW
GetCurrentProcessId
SetCurrentDirectoryA
ReleaseMutex
OpenMutexA
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
lstrcatA
GetProcAddress
LoadLibraryA
GlobalFree
GlobalAlloc
GetFileType
GetFileSize
TerminateThread
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FileTimeToSystemTime
InterlockedIncrement
GetTickCount
DeleteFileA
HeapFree
WriteFile
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
HeapAlloc
LocalAlloc
CreateEventA
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetModuleFileNameA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
GetProcessHeap
WideCharToMultiByte
DestroyMenu
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
UnregisterClassA
SetCursor
GetMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
ShowWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetWindowTextA
SetMenu
SetForegroundWindow
ExitWindowsEx
IsWindowVisible
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetActiveWindow
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
SendMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
RegisterClassExA
wsprintfA
PostQuitMessage
EnableWindow
RegisterWindowMessageA
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DeleteDC
GetStockObject
RestoreDC
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
ScaleWindowExtEx
SaveDC
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
StrToIntW
StrToIntA
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
connect
socket
closesocket
WSAStartup
gethostbyname
WSACleanup
htons
getpeername
WSASetLastError
GetModuleInformation
GetMappedFileNameA
GetIfTable
WSCGetProviderPath
WSCEnumProtocols
ImageDirectoryEntryToData
StartHook
StopHook
send_en
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE