DllGetClassObject
DllRegisterServer
DllUnregisterServer
Run
run
Behavioral task
behavioral1
Sample
538040cfabcbbea5a85b2e159cfb18271a097c0b.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
538040cfabcbbea5a85b2e159cfb18271a097c0b.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
89392e01c51b707f6b60567cdb09eae17dbbd1f0.exe
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
89392e01c51b707f6b60567cdb09eae17dbbd1f0.exe
Resource
win10v2004-20231023-en
Target
13X.rar
Size
1.3MB
MD5
11de991e3ef990e0f041b615f7096d3d
SHA1
7c47fcdfbdc475eb7683a8c9c1715f5ba08574eb
SHA256
de56ec951cb79fdb4d6a16e8fd2a3b2286f9f6ee08d9996a035000c1c5c58f1f
SHA512
464bae05fe41744b4734c88195c96859f7f15d5d83cb0fcc69da99bdff1dde291fd3463388ccbd7a377a473b820774df23f5ae5a3d85e5280f7d31760ad5e952
SSDEEP
24576:B5P751qU9bvBWTfIuLPdLUKc1W1wkMhhKfs6BnBV5ZvcMT+mLkygW:B5P11qU9bZWTfIuJL415XHKfzBB10e+I
resource | yara_rule |
---|---|
static1/unpack001/89392e01c51b707f6b60567cdb09eae17dbbd1f0.exe.vir | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/538040cfabcbbea5a85b2e159cfb18271a097c0b.dll.vir |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
NtWriteFile
NtReadVirtualMemory
RtlNtStatusToDosError
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtWaitForSingleObject
NtCreateThreadEx
NtProtectVirtualMemory
NtWriteVirtualMemory
NtAllocateVirtualMemory
IsDebuggerPresent
DisableThreadLibraryCalls
GetCurrentThreadId
UnhandledExceptionFilter
InitializeSListHead
SetUnhandledExceptionFilter
GetModuleHandleW
GetSystemTimeAsFileTime
GetConsoleWindow
LoadLibraryA
GetProcAddress
WriteProcessMemory
CreateProcessA
CreateFileW
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
ReleaseSRWLockExclusive
ReleaseMutex
ReleaseSRWLockShared
GetLastError
AcquireSRWLockExclusive
GetCurrentThread
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetStdHandle
GetCurrentProcessId
WaitForSingleObject
TryAcquireSRWLockExclusive
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
CreateMutexA
GetModuleHandleA
GetConsoleMode
IsProcessorFeaturePresent
FormatMessageW
ExitProcess
MultiByteToWideChar
WriteConsoleW
TlsGetValue
TlsSetValue
GetModuleBaseNameW
EnumProcessModulesEx
ShowWindow
SetWindowPos
__C_specific_handler
_CxxThrowException
memset
memcmp
__std_type_info_destroy_list
memcpy
memmove
__CxxFrameHandler3
_cexit
_initialize_onexit_table
_initterm
_initterm_e
_seh_filter_dll
_execute_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
free
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Run
run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE