SetHook
SetName
Behavioral task
behavioral1
Sample
explorer.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
explorer.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
explorer.exe.intermediate.xml
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
explorer.exe.intermediate.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
nfzn.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
nfzn.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
nfzn.dll.intermediate.xml
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
nfzn.dll.intermediate.xml
Resource
win10v2004-20221111-en
Target
5eadeba25ef4e49920fa50a8015124ea3de3d4ff55996a95835294edb1bf1fb6
Size
510KB
MD5
776c622c798531da057b776d97d1d07b
SHA1
68bab218302b3e992caef0f2bf3051fe3e1b2e0d
SHA256
5eadeba25ef4e49920fa50a8015124ea3de3d4ff55996a95835294edb1bf1fb6
SHA512
b7f8a838773d2eb16bc6959a7aed22412e6ceea4952ac8c5729e6e3b72f53a66b873a28b0e2c2b4ed57e0ea21e0b68a43ebe945314112cda74f550a584ff24a1
SSDEEP
12288:gJ/dEGNqM86annZALpOsO2/xLWJaOrKYgVRproVm+a7of6iGG:gJ/dxNqMunZAtffAa1Y0roVlvDGG
Processes:
resource | yara_rule |
---|---|
static1/unpack001/nfzn.dll | vmprotect |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
connect
ioctlsocket
socket
WSAGetLastError
send
recv
select
inet_addr
htons
closesocket
WSACleanup
WSAStartup
gethostbyname
GradientFill
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
RtlUnwind
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
ReadFile
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
FileTimeToSystemTime
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetThreadLocale
InterlockedIncrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GetLastError
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
lstrlenA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
LoadLibraryA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
OpenProcess
Sleep
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
WideCharToMultiByte
CreateFileA
WriteFile
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
GetCurrentThreadId
HeapAlloc
GetProcessHeap
HeapFree
lstrcmpiA
GetSystemInfo
LoadCursorA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
CharUpperA
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
CharNextA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
EndPaint
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowTextLengthA
GetWindow
SetFocus
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
FindWindowA
GetWindowThreadProcessId
MessageBoxA
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
EnableWindow
EnumThreadWindows
UnhookWindowsHookEx
SetWindowsHookExA
BeginPaint
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
DispatchMessageA
CallNextHookEx
EnumChildWindows
GetFocus
CallWindowProcA
DefWindowProcA
TrackMouseEvent
SetWindowLongA
RedrawWindow
GetSystemMetrics
GetSysColorBrush
FrameRect
InflateRect
GetSysColor
FillRect
DrawFocusRect
GetWindowTextA
OffsetRect
SendMessageA
DrawTextA
ReleaseDC
GetWindowRect
GetWindowDC
GetClassNameA
GetWindowLongA
RegisterClassA
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
CreatePen
ExtSelectClipRgn
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetStockObject
MoveToEx
LineTo
CreateSolidBrush
SetPixel
SetTextColor
DeleteObject
DeleteDC
CreateCompatibleDC
SetBkMode
SelectObject
CreateCompatibleBitmap
BitBlt
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetTextColor
GetBkColor
CreateBitmap
GetObjectA
SetBkColor
GetClipBox
GetFileTitleA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ord8
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
VariantCopy
OleCreateFontIndirect
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysStringLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSAGetLastError
VirtualFree
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
SetHook
SetName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ