GetNeedSock
WSPStartup
Behavioral task
behavioral1
Sample
7baff31dca6f33e3b578fc2dfcf4772295238470b5def984f7f5c4006560f9bb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7baff31dca6f33e3b578fc2dfcf4772295238470b5def984f7f5c4006560f9bb.dll
Resource
win10v2004-20220812-en
Target
7baff31dca6f33e3b578fc2dfcf4772295238470b5def984f7f5c4006560f9bb
Size
104KB
MD5
1082693ec42fde4fe2c52db99eeb5ed4
SHA1
c1639a5e6eb17ac55402204a3facd6751bfd99fb
SHA256
7baff31dca6f33e3b578fc2dfcf4772295238470b5def984f7f5c4006560f9bb
SHA512
4c21ae1eb42d2cf95468c10df97a892e04a6f5b33427e2165a72a3f19f645752c1e692642da89bfbb01a56341b841f712eddc56c0cb44e3e8265c82c59132158
SSDEEP
1536:3rZYrNicmTw5r9Ek01HJp0RApBMTaXqraSI36ccBvyN:3ONiN1NrSIM+bStzBvy
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
DisableThreadLibraryCalls
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetCurrentProcessId
DeleteFileA
CreateThread
lstrcpyA
GlobalAlloc
GlobalFree
LoadLibraryW
VirtualFree
ExpandEnvironmentStringsW
GetProcAddress
VirtualProtect
GetTempPathA
WritePrivateProfileStringA
GetLastError
lstrlenA
WriteProfileStringA
GetPrivateProfileStringA
GetProfileStringA
WideCharToMultiByte
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
OpenProcess
IsBadReadPtr
LoadLibraryA
ExitThread
GetLocalTime
FormatMessageA
LocalFree
TerminateThread
GetCommandLineA
WinExec
lstrcatA
GetSystemDirectoryA
ReadFile
Sleep
WriteFile
ExitProcess
GetTickCount
FreeLibrary
SetFilePointer
GetFileSize
CreateFileA
GetComputerNameA
wsprintfA
CharLowerA
GetKeyboardState
GetWindowLongA
MapVirtualKeyA
ToAscii
FindWindowA
GetWindowTextA
PostMessageA
DefWindowProcA
PostQuitMessage
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassW
wsprintfW
LoadIconA
MessageBoxA
LoadCursorA
GetStockObject
ShellExecuteA
connect
closesocket
sendto
gethostbyname
setsockopt
recvfrom
WSAAsyncSelect
htonl
bind
listen
WSACleanup
htons
WSAConnect
ntohs
getsockname
accept
WSAGetLastError
WSARecv
WSAAsyncGetHostByName
getpeername
WSASend
select
__WSAFDIsSet
ioctlsocket
inet_addr
WSAStartup
recv
send
WSCGetProviderPath
WSCEnumProtocols
inet_ntoa
socket
memcpy
wcsstr
_itoa
atoi
srand
rand
strncmp
strncpy
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
_errno
_stricmp
_strnicmp
memset
strstr
PathFileExistsA
PathRemoveFileSpecA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetReadFile
GetNeedSock
WSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ