MoveFileE
isyesno
yesno
Overview
overview
8Static
static
8BootDos.exe
windows7-x64
1BootDos.exe
windows10-2004-x64
1FileKill.exe
windows7-x64
1FileKill.exe
windows10-2004-x64
1PKPro.exe
windows7-x64
1PKPro.exe
windows10-2004-x64
1hyfree.dll
windows7-x64
3hyfree.dll
windows10-2004-x64
3pkid.exe
windows7-x64
1pkid.exe
windows10-2004-x64
1绿色下�...��.url
windows7-x64
1绿色下�...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
BootDos.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BootDos.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
FileKill.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
FileKill.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
PKPro.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
PKPro.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
hyfree.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
hyfree.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
pkid.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
pkid.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
绿色下载站首页.url
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
绿色下载站首页.url
Resource
win10v2004-20221111-en
Target
3758a6b307f3e7fd5bff47c726ab39edf2b7f3c8451895401a6aee2b4b6ec35d
Size
2.7MB
MD5
8126c2c841cbbf741fa7e8961028a84f
SHA1
5996b776636fbe09982d2ec528fc0c927882276e
SHA256
3758a6b307f3e7fd5bff47c726ab39edf2b7f3c8451895401a6aee2b4b6ec35d
SHA512
7ad0a4c4c85610d58fa629a6b538945766031d4a0a18568c67cb40bab5a7b8957a1f06c22295b0b54cc1366a6fa00942b4b72aaeb588ec2bf2fd8c25d7280154
SSDEEP
49152:uALlQ0KI53Oi40wRTSna8QzTGenODDFURMyPqk+XyuIw3Qb4cys9XkuXM384Y+e+:uhh30wR9zZnAUJPcCbU088+eHe
resource | yara_rule |
---|---|
static1/unpack001/FileKill.exe | aspack_v212_v242 |
static1/unpack001/hyfree.dll | aspack_v212_v242 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
MoveFileE
isyesno
yesno
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MethCallEngine
ord517
ord518
ord519
ord669
ord631
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ProcCallEngine
ord100
ord616
ord617
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ