BeginJelvfswwcx
EndPannyhngfdi
Yblwgnr
Behavioral task
behavioral1
Sample
a1d47cfc3caa4a377fba975090f505c36b46a9d3e2681e00d23e9f32fd99ceec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1d47cfc3caa4a377fba975090f505c36b46a9d3e2681e00d23e9f32fd99ceec.exe
Resource
win10v2004-20221111-en
Target
a1d47cfc3caa4a377fba975090f505c36b46a9d3e2681e00d23e9f32fd99ceec
Size
1.7MB
MD5
55a0ed0e599474b0565df4ccf979e300
SHA1
9b6676ab07a3e556db44597878facb3d1005200b
SHA256
a1d47cfc3caa4a377fba975090f505c36b46a9d3e2681e00d23e9f32fd99ceec
SHA512
165c3b6aa2600dafa9c22a9f011b99cc21e4295f09282452bded8e8ba0b9e3bb0faa9f34ca71c279f9d6ff895b74ac16ec1aa00c8fbb673716877cea98076ab2
SSDEEP
49152:n129oSFiVwA0EVrZvoHwot72bQFzb9wukcD9HY/r:12mSFqTrZvaw47FFzb9GYm/
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GlobalUnlock
GetCommandLineA
GetStartupInfoA
ExitProcess
VirtualProtect
GetModuleFileNameA
ExitProcess
NtSetInformationFile
ZwOpenObjectAuditAlarm
NtAccessCheckByTypeResultListAndAuditAlarm
NtSetSystemTime
RtlAddAccessAllowedObjectAce
ZwInitiatePowerAction
NtReleaseMutant
ZwCreateMutant
RtlDeleteAce
ZwQuerySemaphore
ZwQueryInformationProcess
RtlRaiseException
ZwReadFile
RtlGetAce
MessageBoxA
BeginJelvfswwcx
EndPannyhngfdi
Yblwgnr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ