Hook
UnHook
Behavioral task
behavioral1
Sample
88b86df127798bebb5fbec96612bd2b8b90b4f1dedd66f843ed55af7f52efc86.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88b86df127798bebb5fbec96612bd2b8b90b4f1dedd66f843ed55af7f52efc86.dll
Resource
win10v2004-20220812-en
Target
88b86df127798bebb5fbec96612bd2b8b90b4f1dedd66f843ed55af7f52efc86
Size
156KB
MD5
831ab373713a23ce0c4de2a272d76790
SHA1
1c45799a6d0cfb3472f501d52b02508918147bae
SHA256
88b86df127798bebb5fbec96612bd2b8b90b4f1dedd66f843ed55af7f52efc86
SHA512
26fbd45d4ada92575fb9fe49a8cc113f239ec8ca7013bc019ab300ffb8746073bd78dba646d6b7717ed5ab7b8385fad3d17c5131405c92fe893c3e0544b3a23f
SSDEEP
3072:MNI/jA9sbnrSoZHLjA3bgU1RltdUVbGsnURjtghIM5BYYyjuuS+/PlO:CW2mRLCblVdUV1UTpSGKu3/N
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
free
timeSetEvent
RegCloseKey
RtlFillMemory
GetModuleHandleA
LoadLibraryA
VirtualAlloc
VirtualFree
GetModuleFileNameA
ExitProcess
ord42
CoInternetSetFeatureEnabled
CreateWindowExA
NtQuerySystemInformation
Hook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ