@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
Overview
overview
7Static
static
7EXPL32.exe
windows7-x64
7EXPL32.exe
windows10-2004-x64
7EXPLORER.scr
windows7-x64
EXPLORER.scr
windows10-2004-x64
explorer2.exe
windows7-x64
1explorer2.exe
windows10-2004-x64
1script.vbs
windows7-x64
1script.vbs
windows10-2004-x64
1uncapper.exe
windows7-x64
1uncapper.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
EXPL32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EXPL32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
EXPLORER.scr
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
EXPLORER.scr
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
explorer2.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
explorer2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
script.vbs
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
script.vbs
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
uncapper.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
uncapper.exe
Resource
win10v2004-20230220-en
Target
gt-virtualslut.rar
Size
624KB
MD5
7c9081af12474e58bf877e04f1fb6173
SHA1
a375babbacbc432e00647932d7c1885ad64e0803
SHA256
ba88d06c80fe6b73c81193078e53c749ff3a3b4e544c3721523a1d9c84483c99
SHA512
97e8c3f44205ba1f8963350d159a18f228ce82d898d63731501559d3e9e9712b6433996046693792479b41f8db59c5f56baff67a5082bd144172964e7b43afa7
SSDEEP
12288:O8xGxZDlMHKEjEDCz+lJpXrt2q7BFNcNcj4+crlV/FNb7MNi/iql0ry5dCR5b:OwGxNaHnAgyDh39ivrrlVTbgNUYbTb
resource | yara_rule |
---|---|
static1/unpack001/EXPL32.EXE | upx |
static1/unpack001/explorer2.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/EXPL32.EXE |
unpack001/explorer2.exe |
unpack003/out.upx |
unpack001/uncapper.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord690
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaEnd
_adj_fdiv_m64
_adj_fprem1
__vbaStrCat
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
_adj_fpatan
EVENT_SINK_Release
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
ord689
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ