DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
WSPStartup
Behavioral task
behavioral1
Sample
d9ebd661affde72a69018e03e7e25eafccdeb495d4ceb2fdcffd4e5cf0d955a0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9ebd661affde72a69018e03e7e25eafccdeb495d4ceb2fdcffd4e5cf0d955a0.dll
Resource
win10v2004-20220812-en
Target
d9ebd661affde72a69018e03e7e25eafccdeb495d4ceb2fdcffd4e5cf0d955a0
Size
148KB
MD5
4600a3a75e9a4c57062806398dd3ee9a
SHA1
7db91559392c5debe1fee722f02b00924b006093
SHA256
d9ebd661affde72a69018e03e7e25eafccdeb495d4ceb2fdcffd4e5cf0d955a0
SHA512
dbb55d7e231a08f5935b94c8eb13e977e409776573c4ca24a55b7afc150025542dc225c8837135c0dc3650ceeb6a44a1500e78a365c4d7ae7ee3232043be60b5
SSDEEP
3072:sYcrIws8HSvXUfWIUJQZMD87EXl/lFzpnB5EHBQw7iPrRV/D:uy/8UJQZS87EXhrdDKewWdR
resource | yara_rule |
---|---|
sample | vmprotect |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapCreate
OpenProcess
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
SetFilePointer
InterlockedExchange
GetLocalTime
GlobalAlloc
GlobalFree
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
GetPrivateProfileIntA
GetPrivateProfileStringA
WideCharToMultiByte
GetModuleHandleA
Module32Next
Module32First
VirtualQuery
WriteProcessMemory
lstrcmpiA
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
GetVersionExA
GetTimeZoneInformation
GetSystemTime
GetVersion
LocalFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
GetCPInfo
GetStringTypeW
GetStringTypeA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
GetCommandLineA
CreateToolhelp32Snapshot
GetCurrentProcessId
Process32First
Process32Next
TerminateThread
CreateProcessA
GetModuleFileNameA
CreateThread
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
HeapFree
RaiseException
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
CreateEventA
SetEvent
GetLastError
WaitForSingleObject
MultiByteToWideChar
Sleep
GetModuleFileNameW
FindResourceA
CreateFileA
LoadResource
SizeofResource
LockResource
CloseHandle
WriteFile
DeleteFileA
GetEnvironmentVariableA
VirtualFree
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
TlsGetValue
SetLastError
TlsFree
TlsAlloc
RtlUnwind
VirtualProtect
GetModuleFileNameA
ExitProcess
TranslateMessage
GetMessageA
ShowWindow
GetDesktopWindow
SetTimer
CreateWindowExA
MoveWindow
GetSystemMetrics
PostMessageA
KillTimer
DispatchMessageA
GetWindowThreadProcessId
BringWindowToTop
SendMessageA
SetForegroundWindow
EndDialog
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
DestroyWindow
SetWindowLongA
MessageBoxA
RegSetValueExA
RegDeleteValueA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
ShellExecuteA
CoInitialize
CoCreateInstance
DispCallFunc
VariantClear
SysStringLen
LoadRegTypeLi
VariantInit
SysAllocString
SysFreeString
ord16
ord15
ord10
ord23
ord18
ord57
ord47
ord38
ord43
ord58
ord30
ord32
ord44
ord11
ord21
ord31
GetAdaptersInfo
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
WSCInstallProvider
WSCGetProviderPath
WSCDeinstallProvider
WSACleanup
WSAStartup
closesocket
WSARecv
WSASend
select
WSAGetLastError
connect
WSAIoctl
htons
gethostbyname
socket
recv
send
WSCEnumProtocols
inet_addr
WSCWriteProviderOrder
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
ImageDirectoryEntryToData
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
WSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ