CheckCilent
GetTipsDlgHwnd
JindFuction
Behavioral task
behavioral1
Sample
6c641d26417b2c3b032e50e635b3f23893fa10af20ae542acbb28e322441b6f2.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6c641d26417b2c3b032e50e635b3f23893fa10af20ae542acbb28e322441b6f2.dll
Resource
win10v2004-20230915-en
Target
6c641d26417b2c3b032e50e635b3f23893fa10af20ae542acbb28e322441b6f2
Size
1.8MB
MD5
dfa66cf360800147c5c93c1b200ca348
SHA1
b18e2283234897f0d428260a8aa6e758d0827bf2
SHA256
6c641d26417b2c3b032e50e635b3f23893fa10af20ae542acbb28e322441b6f2
SHA512
6123316f8cbe61295398b4aa13a9708ca5ea2eeb7f84636b0e00ce97989d4036b7206bf385235f52fa327721b88a8e9bc1042cba1965a492daab6308d7bf0970
SSDEEP
49152:bbohcjA9XN+p2TpV7G9cOqVsJmk+ug2gnPBjvT9:OFN+e77GEVsW2sBf9
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
6c641d26417b2c3b032e50e635b3f23893fa10af20ae542acbb28e322441b6f2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WritePrivateProfileStringA
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
VirtualAlloc
GetSystemInfo
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
HeapCreate
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GetThreadPriority
VirtualProtectEx
FlushInstructionCache
GetThreadContext
HeapSize
GetCPInfo
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalUnlock
GlobalFree
SuspendThread
ResumeThread
SetThreadPriority
InterlockedDecrement
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
lstrcmpW
lstrlenA
CreateThread
DeleteFileA
WriteProcessMemory
OpenFileMappingA
GetTempPathA
GetCurrentProcessId
GetVersionExA
OutputDebugStringA
GetCurrentThreadId
WaitForDebugEvent
CreateToolhelp32Snapshot
VirtualProtect
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetModuleFileNameA
LockResource
Process32Next
OpenThread
LoadLibraryA
GetLocalTime
GetPrivateProfileStringA
EnterCriticalSection
GetProcAddress
GetLastError
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
ReadFile
TerminateProcess
CreateProcessA
LeaveCriticalSection
ReadProcessMemory
SizeofResource
InitializeCriticalSectionAndSpinCount
LoadLibraryW
WideCharToMultiByte
WriteFile
VirtualQueryEx
GetWindowsDirectoryA
CreateRemoteThread
GetCurrentThread
Process32First
LoadLibraryExW
LoadResource
FreeLibrary
VirtualQuery
DebugActiveProcessStop
GetNativeSystemInfo
FindResourceA
CreateMutexW
GetFileSize
CreateFileA
CloseHandle
IsDebuggerPresent
Sleep
GetACP
GetTickCount
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
IsWindowEnabled
SetCursor
PostQuitMessage
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemCount
GetClassInfoExA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
PostMessageA
GetWindowThreadProcessId
GetClassInfoA
ShowWindow
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SetParent
GetClientRect
GetDlgItem
GetSysColorBrush
SetWindowTextA
EnableWindow
GetClassNameA
RegisterClassExA
wsprintfA
FindWindowExA
wsprintfW
MessageBoxA
CreateWindowExA
GetSubMenu
EnumChildWindows
SendMessageTimeoutA
DestroyMenu
LoadCursorA
UnregisterClassA
IsDialogMessageA
SetDlgItemTextA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetCursorPos
CharUpperBuffW
MessageBoxW
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateSolidBrush
CreateBitmap
OpenPrinterA
ClosePrinter
DocumentPropertiesA
RegSetValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
RegQueryValueExA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
VariantInit
VariantChangeType
VariantClear
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
GetExtendedTcpTable
GetModuleFileNameExA
timeGetTime
WSAIoctl
gethostname
WSAStartup
inet_addr
WSAGetLastError
WSAConnect
htons
getsockname
recv
bind
socket
gethostbyname
inet_ntoa
ntohs
WTSSendMessageW
CheckCilent
GetTipsDlgHwnd
JindFuction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ