CheckCilent
GetTipsDlgHwnd
JindFuction
Behavioral task
behavioral1
Sample
04c8fb3c84bf9b1d7f30d7add961fef2d6e4c090f12c0532cc130e0c33d7a24d.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04c8fb3c84bf9b1d7f30d7add961fef2d6e4c090f12c0532cc130e0c33d7a24d.dll
Resource
win10v2004-20230220-en
Target
04c8fb3c84bf9b1d7f30d7add961fef2d6e4c090f12c0532cc130e0c33d7a24d
Size
1.6MB
MD5
eff68023f354e0cc23a53e8a6e031f87
SHA1
1be07ad80e3a4cc215a524718b19e59d059b557e
SHA256
04c8fb3c84bf9b1d7f30d7add961fef2d6e4c090f12c0532cc130e0c33d7a24d
SHA512
964e0bae50357add7cefefe7f2d251a7f25ee325d5dc975d17e714351c63d94a7289c88cc5093f1c747f5383de4c73a346ff49e7f4c1f11696c230694a0285e0
SSDEEP
49152:uGAsL8/xAX/vT6Scez8DvGB9CwE/3xeUBVDiI7KcJt:DAsUx+uSctD8IfeAVDiI7pJt
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
04c8fb3c84bf9b1d7f30d7add961fef2d6e4c090f12c0532cc130e0c33d7a24d |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetModuleHandleW
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
ExitProcess
RaiseException
SetErrorMode
DeleteCriticalSection
GetSystemInfo
HeapSize
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GetThreadPriority
VirtualProtectEx
FlushInstructionCache
GetThreadContext
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FormatMessageA
LocalFree
MulDiv
GlobalUnlock
GlobalFree
FreeResource
SuspendThread
ResumeThread
SetThreadPriority
InterlockedDecrement
GlobalAddAtomA
SetLastError
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
lstrlenA
CreateThread
DeleteFileA
WriteProcessMemory
OpenFileMappingA
GetTempPathA
GetCurrentProcessId
GetVersionExA
OutputDebugStringA
GetCurrentThreadId
WaitForDebugEvent
CreateToolhelp32Snapshot
VirtualProtect
LoadLibraryExA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetModuleFileNameA
LockResource
CreateFileMappingA
Process32Next
OpenThread
LoadLibraryA
GetLocalTime
GetPrivateProfileStringA
EnterCriticalSection
GetProcAddress
IsDBCSLeadByteEx
GetLastError
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
ReadFile
CreateProcessA
LeaveCriticalSection
ReadProcessMemory
SizeofResource
InitializeCriticalSectionAndSpinCount
LoadLibraryW
WideCharToMultiByte
OpenProcess
WriteFile
VirtualQueryEx
GetCurrentThread
Process32First
LoadLibraryExW
LoadResource
FreeLibrary
VirtualQuery
DebugActiveProcessStop
UnmapViewOfFile
MapViewOfFile
GetNativeSystemInfo
FindResourceA
CreateMutexW
GetFileSize
CreateFileA
CloseHandle
IsDebuggerPresent
OpenEventA
TerminateProcess
Sleep
GetTickCount
VirtualAlloc
GetCurrentProcess
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
GetWindowThreadProcessId
PostMessageA
ShowWindow
EnumChildWindows
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SetParent
GetClientRect
GetDlgItem
GetSysColorBrush
SetWindowTextA
EnableWindow
GetClassNameA
RegisterClassExA
wsprintfA
wsprintfW
MessageBoxA
SendMessageTimeoutA
CreateWindowExA
DestroyMenu
LoadCursorA
UnregisterClassA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
GetClassInfoA
CharUpperBuffW
MessageBoxW
DeleteObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DeleteDC
GetStockObject
SetMapMode
GetClipBox
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
CreateSolidBrush
CreateBitmap
OpenPrinterA
ClosePrinter
DocumentPropertiesA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
LookupPrivilegeValueA
RegQueryValueExA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
PathFindFileNameA
PathFindExtensionA
VariantInit
VariantChangeType
VariantClear
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
GetExtendedTcpTable
GetModuleFileNameExA
timeGetTime
inet_ntoa
WTSSendMessageW
CheckCilent
GetTipsDlgHwnd
JindFuction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ