DllCanUnloadNow
DllRegisterServer
DllUnRegisterServer
ServiceMain
Behavioral task
behavioral1
Sample
b2342ba9654599e7c2caf008882187cd251f2a6553c567077827ca6bff29d29c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2342ba9654599e7c2caf008882187cd251f2a6553c567077827ca6bff29d29c.dll
Resource
win10v2004-20220812-en
Target
b2342ba9654599e7c2caf008882187cd251f2a6553c567077827ca6bff29d29c
Size
126KB
MD5
7e84db5c12b74723c4bf144fee532b51
SHA1
f223919096a9d7605bd8caa4d3db1c3253505f2a
SHA256
b2342ba9654599e7c2caf008882187cd251f2a6553c567077827ca6bff29d29c
SHA512
2a7f3ccb252d5f331d9e889f9544d70aae08e6cf43aa10f5a2552d642819706af5f2ce1a4eb426f789825fddddc10b6fd195a8ccb3da3b372a9c6d0a429d56c0
SSDEEP
3072:m/j121MzYk2eP+jRfOmnPraqOgBJ158SA5uue5v:Y121M0k2e2kmzwwv5PAQ1d
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
CreateEventA
GetVersion
MoveFileExA
GetWindowsDirectoryA
CopyFileA
SetLastError
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
CreateFileA
GetFileSize
FlushViewOfFile
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
CreateMutexA
OpenMutexA
WinExec
GetStdHandle
GetExitCodeProcess
GetProcessHeap
GetModuleFileNameA
GetEnvironmentVariableA
CreatePipe
ReadFile
PeekNamedPipe
FreeConsole
GetCurrentThreadId
SetConsoleCursorPosition
WriteConsoleOutputA
SetConsoleCtrlHandler
ExitProcess
SetConsoleWindowInfo
SetConsoleScreenBufferSize
AllocConsole
GetConsoleScreenBufferInfo
ReadConsoleOutputA
WriteConsoleInputA
GenerateConsoleCtrlEvent
GetFileAttributesA
DeviceIoControl
FreeLibrary
GetCurrentProcessId
GetModuleHandleA
GetProcAddress
DeleteFileA
GetFileAttributesExA
FindFirstFileA
FindNextFileA
FindClose
GetCurrentDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
CreateThread
HeapFree
VirtualQueryEx
HeapAlloc
LoadLibraryA
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateRemoteThread
WaitForSingleObject
GetConsoleTitleA
VirtualFreeEx
CreateProcessA
TerminateProcess
GetCurrentProcess
Sleep
CloseHandle
GetLastError
OpenProcess
GetSystemDirectoryA
GetSystemInfo
GetComputerNameA
GetVersionExA
WriteFile
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
lstrcmpiW
LCMapStringW
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleFileNameA
ExitProcess
ExitWindowsEx
GetThreadDesktop
GetUserObjectInformationA
CloseDesktop
CreateWindowStationA
SetProcessWindowStation
CloseWindowStation
CreateDesktopA
SetThreadDesktop
GetProcessWindowStation
MessageBoxA
ConvertStringSidToSidA
RegEnumKeyA
OpenSCManagerA
OpenServiceA
RegOpenKeyA
ControlService
ChangeServiceConfigA
QueryServiceStatus
CloseServiceHandle
RegCreateKeyA
StartServiceA
RegCloseKey
OpenProcessToken
RegSetValueExA
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
LookupPrivilegeValueA
LookupAccountSidW
GetTokenInformation
SetServiceStatus
LookupAccountSidA
RegQueryValueExA
CreateServiceA
RegOpenKeyExA
DeleteService
_CxxThrowException
rename
??3@YAXPAX@Z
_purecall
__CxxFrameHandler
strncpy
strncat
sprintf
strstr
strtol
strrchr
fread
fclose
fopen
fwrite
memmove
wcscpy
_vsnprintf
free
??2@YAPAXI@Z
strncmp
malloc
wcsncpy
wcstombs
swprintf
atoi
localtime
strchr
ftell
time
realloc
fflush
_wcsicmp
fprintf
_stricmp
printf
_strlwr
??1type_info@@UAE@XZ
URLDownloadToFileA
WSAStartup
WSACleanup
ntohl
ntohs
htonl
sendto
closesocket
socket
setsockopt
htons
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
CheckSumMappedFile
DllCanUnloadNow
DllRegisterServer
DllUnRegisterServer
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ