GetCardData
Inject
Behavioral task
behavioral1
Sample
dd214dfd31d181721e3bf0041ba886cd259e5b9b29881e66147cb8f74fc59222.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
dd214dfd31d181721e3bf0041ba886cd259e5b9b29881e66147cb8f74fc59222.dll
Resource
win10v2004-20230703-en
Target
dd214dfd31d181721e3bf0041ba886cd259e5b9b29881e66147cb8f74fc59222
Size
1.8MB
MD5
619e2816f695275a8a55fcdc3257de97
SHA1
5a4d4daa1d31d1c18c90be75bf0fda837cc55cd1
SHA256
dd214dfd31d181721e3bf0041ba886cd259e5b9b29881e66147cb8f74fc59222
SHA512
5e52a73afbe383cec6985309413ee943799a71fd6a4fdbce4bff5ae776ae3246c755778022626fb3a1b479263e118399e9cf813475b4c8299fbc5afd3207fde8
SSDEEP
49152:8H3ffFX4GvrkYZuwMlX84AU7otL6mqT2CP+KriyjtChJezp:8Xf9X4GvrkY0lzw1R8+yjQhJ
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
dd214dfd31d181721e3bf0041ba886cd259e5b9b29881e66147cb8f74fc59222 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersion
GetVersionExA
TlsAlloc
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetCursorPos
ExtTextOutA
GetFileTitleA
DocumentPropertiesA
RegCreateKeyExA
SHGetSpecialFolderPathA
ord17
Netbios
inet_ntoa
GetModuleInformation
GetCardData
Inject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ