DNF_��??��1��?��
RunDllHostCallBack
����D?1???
Behavioral task
behavioral1
Sample
cc678421e0890137f8d8d936d1a23dd997577610c1ddbc724e911dce8407d1a2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc678421e0890137f8d8d936d1a23dd997577610c1ddbc724e911dce8407d1a2.dll
Resource
win10v2004-20220812-en
Target
cc678421e0890137f8d8d936d1a23dd997577610c1ddbc724e911dce8407d1a2
Size
800KB
MD5
42acfabde33ddbec78c7261d8d3fe48d
SHA1
99714b08b0fc84884fc6e5f374217ddda5e5fa82
SHA256
cc678421e0890137f8d8d936d1a23dd997577610c1ddbc724e911dce8407d1a2
SHA512
64e59c93656d32c897fb4ae86df467f0f803fbde2337a9c57eb57f9f70a0f7db73653a651f99ba1945a7ad1e2df6fd870adb179c15915b9515efa51c79f410ee
SSDEEP
24576:qdXPCyXEM4jJTY2lmlxNzdKaXv9JoP+KIMB9yVj3jzY5:qtPkDW2+v3o7/B96jg
Processes:
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProfileStringA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
SetActiveWindow
GetROP2
midiStreamRestart
DocumentPropertiesA
RegQueryValueA
ShellExecuteA
OleUninitialize
UnRegisterTypeLi
ord17
recv
GetOpenFileNameA
DNF_��??��1��?��
RunDllHostCallBack
����D?1???
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ