CB_Init
DllEntry
DllProc
Behavioral task
behavioral1
Sample
aa55ba5844087e191d1d99727bdac5af.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aa55ba5844087e191d1d99727bdac5af.dll
Resource
win10v2004-20231215-en
Target
aa55ba5844087e191d1d99727bdac5af
Size
482KB
MD5
aa55ba5844087e191d1d99727bdac5af
SHA1
366e4d196cba49bdee20516d4e5d359251376f88
SHA256
c017c3f86ec6876e33ca33c4f9611ea8e0b64520e04197ec6f59652e205fc115
SHA512
8a123a125e0a88957447c06024f1f9a03867291893101faf4de90ef7b35abc3c179b95f192cb5740f24d18c835388c0279aff1a4c1efe2f62ca19290de09f42c
SSDEEP
12288:xI4dtMiMxaFJAMgm9LVu3WwZ2SMwWP1Uy/3Ej6Ts+/L:xI4dtMiMxaFLB9LVu3WwZVMnuy/0OTsw
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
aa55ba5844087e191d1d99727bdac5af |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryW
GetCurrentThread
CreateEventA
GetCommandLineW
GetEnvironmentVariableW
ExitProcess
CreateThread
WaitForSingleObject
GetTickCount
Sleep
DisableThreadLibraryCalls
WideCharToMultiByte
WriteFile
FlushFileBuffers
CreateFileA
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
CreateProcessW
GetModuleHandleW
GetModuleHandleA
GetSystemInfo
FindFirstFileW
FindNextFileW
FindClose
GetSystemDirectoryW
ProcessIdToSessionId
SetCurrentDirectoryW
LoadLibraryA
GetVersionExW
GlobalAlloc
GlobalFree
CreatePipe
GetStartupInfoW
ReadFile
SystemTimeToFileTime
HeapDestroy
HeapAlloc
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LCMapStringW
FlushInstructionCache
SetErrorMode
lstrlenW
GetLocalTime
GetModuleFileNameW
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
VirtualQuery
FindResourceExW
CreateMutexW
FindResourceW
LoadResource
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringA
RtlUnwind
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
UnhandledExceptionFilter
LockResource
SizeofResource
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
MapViewOfFile
CreateFileMappingW
CloseHandle
OpenMutexW
GetLastError
HeapFree
GetSystemTimeAsFileTime
VirtualProtect
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
SetFilePointer
SetEvent
CreateEventW
ResetEvent
CreateRemoteThread
VirtualFreeEx
VirtualAllocEx
WriteProcessMemory
GetThreadContext
SetThreadContext
VirtualFree
VirtualAlloc
SuspendThread
ResumeThread
GetCurrentDirectoryW
LocalFileTimeToFileTime
QueryPerformanceCounter
GetCPInfo
wsprintfW
CheckTokenMembership
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
AllocateAndInitializeSid
FreeSid
OpenProcessToken
StringFromCLSID
CoTaskMemFree
CoCreateGuid
PathFileExistsW
StrCmpIW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetReadFileExW
InternetSetStatusCallbackW
InternetSetOptionW
DnsFree
DnsQuery_W
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
inet_addr
inet_ntoa
htonl
GetAdaptersInfo
GetIpNetTable
GetIpAddrTable
SendARP
GetIpForwardTable
GetMappedFileNameW
UuidCreateSequential
CB_Init
DllEntry
DllProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ