DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Fn
Behavioral task
behavioral1
Sample
885767c50f9f67e5e163101afdf4264eefe2e4220a5e1c2c92eae222665ff894.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
885767c50f9f67e5e163101afdf4264eefe2e4220a5e1c2c92eae222665ff894.dll
Resource
win10v2004-20220812-en
Target
885767c50f9f67e5e163101afdf4264eefe2e4220a5e1c2c92eae222665ff894
Size
92KB
MD5
3589f8ce8e1c1cbebcead4756fdbba8c
SHA1
463dbe8f730b56f226447048df525759789dfc4a
SHA256
885767c50f9f67e5e163101afdf4264eefe2e4220a5e1c2c92eae222665ff894
SHA512
d0b809567f248ed497ce09a0494bc23bab98690813eddd3d30fe0499d93c431617f9483ab0a282493768d43ae14cf24422b86790a7dd2ace75b2ab5ce2883f3f
SSDEEP
768:oTrBbxRTWICOtnmmhP7WMYVABBZaP637:oPlvTWStxP7vYm/Znr
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FlushInstructionCache
CreateThread
SetLastError
LocalAlloc
LocalFree
WinExec
GetSystemDirectoryA
SetFileAttributesA
WriteFile
CreateEventA
WaitForSingleObject
GetVersionExA
LoadLibraryExW
OpenProcess
VirtualAllocEx
VirtualProtectEx
CreateRemoteThread
GetModuleHandleA
Process32First
Process32Next
CreateToolhelp32Snapshot
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
DeleteFileA
GetWindowsDirectoryA
GetLastError
GetFileSize
GetProcAddress
Sleep
IsBadReadPtr
VirtualProtect
GetCurrentProcess
WriteProcessMemory
GetTickCount
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
strstr
strncpy
strcat
_strlwr
_strnicmp
_stricmp
strrchr
_mbscmp
sprintf
strlen
strcpy
atoi
memcpy
memset
??1type_info@@UAE@XZ
strcmp
_except_handler3
printf
__dllonexit
_onexit
__CxxFrameHandler
free
_initterm
malloc
_adjust_fdiv
GetWindowTextA
GetClassNameA
EnumWindows
GetWindowThreadProcessId
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Fn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE