DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
Behavioral task
behavioral1
Sample
31d99f567c43ee0c26a394de178571e8fc64c4ffb92e1692c25cf08ce8e2445a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
31d99f567c43ee0c26a394de178571e8fc64c4ffb92e1692c25cf08ce8e2445a.dll
Resource
win10v2004-20221111-en
Target
31d99f567c43ee0c26a394de178571e8fc64c4ffb92e1692c25cf08ce8e2445a
Size
64KB
MD5
31dee6d5d2af6a1c5908de853ea2a130
SHA1
03426f14ffd948a2290f274279541215e364e7a8
SHA256
31d99f567c43ee0c26a394de178571e8fc64c4ffb92e1692c25cf08ce8e2445a
SHA512
39ed588d9e33929866a687122692b892408e80f47d5e1ec4cfcb3a7683655d51889a1a16cc2c3e57152b2b43e88aeda874c1ca383a276141b6502dd02eeac746
SSDEEP
768:Re+khqTXnhKftGtsVH/mNAVLGQGxb/A7L3nSS/Ia/oFXqUWuu7KYWvk:zvTXnhKAtsheNAVLGQMTkQcUvY6k
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WritePrivateProfileStringA
GetPrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
SetFilePointer
GetModuleFileNameA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
IsBadReadPtr
VirtualAlloc
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
Process32Next
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
DeleteFileA
ReadFile
GetTickCount
lstrcmpiA
lstrcmpA
WinExec
GetCurrentProcess
ExitProcess
Sleep
lstrlenA
lstrcpynA
CreateFileA
WriteFile
CloseHandle
lstrcpyA
GetTempPathA
lstrcatA
VirtualProtect
OutputDebugStringA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetForegroundWindow
GetClassNameA
EnumWindows
GetSystemMetrics
IsWindowVisible
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
GetWindowInfo
PrintWindow
FindWindowA
PostThreadMessageA
GetWindowThreadProcessId
IsRectEmpty
ReleaseDC
LoadImageA
GetDC
ShowScrollBar
EndDialog
GetWindowTextA
SendMessageA
GetDlgItem
SetLayeredWindowAttributes
SetWindowLongA
GetWindowLongA
GetCursorPos
ExitWindowsEx
DialogBoxParamA
FindWindowExA
CreateCompatibleBitmap
DeleteObject
SelectPalette
CreateDCA
GetDeviceCaps
DeleteDC
StretchBlt
GetObjectA
SelectObject
CreateCompatibleDC
GetStockObject
SetTextColor
SetBkColor
GetDIBits
RealizePalette
BitBlt
CryptAcquireContextA
CryptCreateHash
CryptHashData
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
HttpAddRequestHeadersA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCheckConnectionA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetQueryDataAvailable
inet_ntoa
gethostbyname
GdipCloneImage
GdipDisposeImage
GdipFree
GdiplusStartup
GdipAlloc
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
Netbios
atoi
strstr
free
malloc
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
memmove
strchr
sscanf
sprintf
strrchr
DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ