CancelDll
LoadDll
Behavioral task
behavioral1
Sample
84972a731f8b1bc81a3867dfa31033e07f7e3065cb02c0c4f4054a92b1cde54f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
84972a731f8b1bc81a3867dfa31033e07f7e3065cb02c0c4f4054a92b1cde54f.dll
Resource
win10v2004-20220812-en
Target
84972a731f8b1bc81a3867dfa31033e07f7e3065cb02c0c4f4054a92b1cde54f
Size
82KB
MD5
1300bbba401e30ebbd263b5a14840d40
SHA1
1983a90bbf4822773b1353f3c253a3ca8883c935
SHA256
84972a731f8b1bc81a3867dfa31033e07f7e3065cb02c0c4f4054a92b1cde54f
SHA512
f92f5e771ad3849bf977ffebe5c2644516cf4ecf294bc764d1a5752ae2fc887f701f51d743eb6c84344dea821eae0c0062e872647affd4790385864345e4fb48
SSDEEP
1536:S7mJbCcpzYCvsPIojr52kPbz6by1qTpiuQBQLwczrjdSmJe:S7mpvz/7oRrzzbqliWMc/BzJe
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
Module32Next
Module32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
GetPrivateProfileStringA
ReadFile
GetFileSize
CreateFileA
GetModuleHandleA
SetFilePointer
HeapAlloc
GetProcessHeap
OutputDebugStringA
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
WideCharToMultiByte
FreeLibrary
GetKeyboardState
GetDC
GetWindowRect
wvsprintfA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
GetClassNameW
wsprintfA
SetWindowsHookExA
ToAscii
GetWindowThreadProcessId
AttachThreadInput
GetFocus
FindWindowA
GetWindow
DeleteUrlCacheEntry
URLDownloadToFileA
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
wcslen
_strcmpi
time
srand
wcscpy
wcsstr
exit
printf
rand
strstr
strrchr
strncpy
malloc
_stricmp
tolower
_vsnprintf
_ltoa
_strupr
wcsncat
memset
sprintf
strcpy
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
memcpy
free
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ