scanCook
scanbegin
Behavioral task
behavioral1
Sample
1accef878d5fd0ef70de2a68d9afb548bb41039bd869210217aafa94b48efbb5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1accef878d5fd0ef70de2a68d9afb548bb41039bd869210217aafa94b48efbb5.dll
Resource
win10v2004-20220901-en
Target
1accef878d5fd0ef70de2a68d9afb548bb41039bd869210217aafa94b48efbb5
Size
468KB
MD5
041827ab68cab537676f44cc1f0200ac
SHA1
04e931b145ec60587e0631be6ff191c4aa98936f
SHA256
1accef878d5fd0ef70de2a68d9afb548bb41039bd869210217aafa94b48efbb5
SHA512
d6c71b9124b9cd35cc07ab3a82ec636a63eae7831a0f87ca418208d41a596d880bef09abccd5232181590fa9e7ed985254c0354fb38a05e5e42dc2c0db51fbcc
SSDEEP
6144:20SNsQRAZu5rHQ+jE0r/ah6IPdJwBfRM0c+IIH5lDcinE7VoqGe6qnMemoLwplYN:ySQeZYQKEeSfGA+5oCGVoqMemzlYN
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateProcessW
GetModuleHandleA
GetProcAddress
VirtualProtect
?uncaught_exception@std@@YA_NXZ
?what@exception@std@@UBEPBDXZ
WSAAsyncSelect
CoCreateInstance
SetTimer
OpenProcessToken
GetModuleFileNameExA
scanCook
scanbegin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ