CheckCilent
GetTipsDlgHwnd
JindFuction
Behavioral task
behavioral1
Sample
c9412f7c2c8abcf935e4f4ac102192b7c145aff76d3714740842267c6c883ed7.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c9412f7c2c8abcf935e4f4ac102192b7c145aff76d3714740842267c6c883ed7.dll
Resource
win10v2004-20230915-en
Target
c9412f7c2c8abcf935e4f4ac102192b7c145aff76d3714740842267c6c883ed7
Size
5.0MB
MD5
0bb57ee2193072052b154f3f48c2eb1c
SHA1
185b40e23b0a203ce0e0a9e0639d0f5748f949c4
SHA256
c9412f7c2c8abcf935e4f4ac102192b7c145aff76d3714740842267c6c883ed7
SHA512
89dd75f780660674f797806f019dc3475363273d221045e2c796f72e60901a51a979e3f6162cc1a13d7b85ca591f675d4e19ff97c54be9d2186181207e9f6c4f
SSDEEP
98304:rb2jE/9izE5txWclDavzhV/g+Mb+yQICWIAm2B4B46xynZ+58:rmE73Duz7RMgICWRmsF68n
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
c9412f7c2c8abcf935e4f4ac102192b7c145aff76d3714740842267c6c883ed7 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
VirtualAlloc
SetErrorMode
HeapSize
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
HeapCreate
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GetThreadPriority
VirtualProtectEx
FlushInstructionCache
GetThreadContext
DeleteCriticalSection
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalUnlock
GlobalFree
SuspendThread
ResumeThread
SetThreadPriority
InterlockedDecrement
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
lstrcmpW
lstrlenA
DeviceIoControl
GetSystemDirectoryA
CreateThread
DeleteFileA
WriteProcessMemory
OpenFileMappingA
GetTempPathA
GetCurrentProcessId
CloseHandle
GetVersionExA
OutputDebugStringA
GetCurrentThreadId
WaitForDebugEvent
CreateToolhelp32Snapshot
VirtualProtect
GetModuleHandleA
FindNextFileA
GetPrivateProfileSectionNamesA
GetModuleFileNameA
OpenEventA
LockResource
Process32Next
OpenThread
LoadLibraryA
GetLocalTime
GetPrivateProfileStringA
FindClose
EnterCriticalSection
GetProcAddress
GetLastError
FindFirstFileA
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
ReadFile
TerminateProcess
CreateProcessA
LeaveCriticalSection
ReadProcessMemory
SizeofResource
InitializeCriticalSectionAndSpinCount
TerminateThread
LoadLibraryW
WideCharToMultiByte
OpenProcess
WriteFile
VirtualQueryEx
GetWindowsDirectoryA
CreateRemoteThread
GetCurrentThread
Process32First
GetCurrentProcess
LoadLibraryExW
LoadResource
FreeLibrary
VirtualQuery
DebugActiveProcessStop
MoveFileExA
GetNativeSystemInfo
FindResourceA
CreateMutexW
GetFileSize
CreateFileA
IsDebuggerPresent
Sleep
GetSystemInfo
GetTickCount
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
IsWindowEnabled
SetCursor
PostQuitMessage
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
PostMessageA
SetWindowsHookExA
CallNextHookEx
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SetParent
GetClientRect
GetDlgItem
GetSysColorBrush
SetWindowTextA
EnableWindow
SetWindowsHookExW
GetClassNameA
RegisterClassExA
wsprintfA
FindWindowExA
wsprintfW
MessageBoxA
CreateWindowExA
SendMessageTimeoutA
EnumChildWindows
ShowWindow
GetClassInfoA
GetWindowThreadProcessId
RegisterClassA
MessageBoxExA
MessageBoxW
DestroyMenu
LoadCursorA
UnregisterClassA
IsDialogMessageA
SetDlgItemTextA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
GetSysColor
TabbedTextOutA
CharUpperBuffW
MessageBoxW
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateSolidBrush
CreateBitmap
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegSetValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
OpenSCManagerA
StartServiceA
CreateServiceA
CloseServiceHandle
OpenServiceA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
RegQueryValueExA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
GetExtendedTcpTable
GetModuleFileNameExW
GetModuleFileNameExA
timeGetTime
WSAIoctl
WSAConnect
WTSSendMessageW
CheckCilent
GetTipsDlgHwnd
JindFuction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE