_MainWndProc@16
_StubFileWrite@12
Overview
overview
7Static
static
3Green/Uxth....5.exe
windows7-x64
7Green/Uxth....5.exe
windows10-2004-x64
7Green/Vist...rt.exe
windows7-x64
1Green/Vist...rt.exe
windows10-2004-x64
1Green/Vist...ok.dll
windows7-x64
1Green/Vist...ok.dll
windows10-2004-x64
1Green/Visu...le.dll
windows7-x64
1Green/Visu...le.dll
windows10-2004-x64
1Green/Visu...ve.dll
windows7-x64
1Green/Visu...ve.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Green/Uxtheme patcher/UXTheme Multi-Patcher 5.5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Green/Uxtheme patcher/UXTheme Multi-Patcher 5.5.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Green/Vistart/ViStart.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Green/Vistart/ViStart.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Green/Vistart/mainhook.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Green/Vistart/mainhook.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Green/Visual Style/Shell/NormalColor/shellstyle.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Green/Visual Style/Shell/NormalColor/shellstyle.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Green/Visual Style/VistaLive.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Green/Visual Style/VistaLive.dll
Resource
win10v2004-20231215-en
Target
41db66b83b00102a9db31c2ad406418c
Size
2.6MB
MD5
41db66b83b00102a9db31c2ad406418c
SHA1
d20f737c9262528dbe75aab96abab0a2d9b41299
SHA256
2ce606b943c8ab3747504f0bf5d2a55b0427d3bb3f771885f92f4d799b9b7df0
SHA512
dd6751bd8f0545edaba0e8d1ee9f0004198634c177b9ebeefc92d45505adf91b72ce8de6900708d2d7fcc29349a45aceff5b1966feb0907fb4f5740e5a54ceba
SSDEEP
49152:oi2dS7ym5XqFFG/WH39Q4SPq+gspzf67QF7ek4b8vuMs9nTkh5Mw:oioS7y+4FG/Mh1MfRFm4mvQh5Mw
Checks for missing Authenticode signature.
resource |
---|
unpack001/Green/Uxtheme patcher/UXTheme Multi-Patcher 5.5.exe |
unpack001/Green/Vistart/ViStart.exe |
unpack001/Green/Vistart/mainhook.dll |
unpack001/Green/Visual Style/Shell/NormalColor/shellstyle.dll |
unpack001/Green/Visual Style/VistaLive.msstyles |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
lstrcpyA
GetCommandLineA
SetErrorMode
lstrlenA
MulDiv
GetTempFileNameA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FormatMessageA
lstrcatA
GetLastError
_lwrite
_llseek
GlobalUnlock
_lopen
GlobalAlloc
GlobalFree
_lclose
_lcreat
LoadLibraryA
GetProcAddress
FreeLibrary
OpenFile
GetVersionExA
GetCurrentProcess
WinExec
ExitProcess
_lread
LocalFree
GetTempPathA
GlobalLock
GetDC
BeginPaint
EndPaint
InvalidateRect
PostQuitMessage
SendMessageA
DefWindowProcA
GetClientRect
CreateWindowExA
DrawTextA
ReleaseDC
ShowWindow
SetWindowPos
UpdateWindow
SetTimer
LoadIconA
wsprintfA
MessageBoxA
ExitWindowsEx
RegisterClassA
LoadCursorA
DeleteObject
GetStockObject
GetDeviceCaps
PatBlt
CreateSolidBrush
TextOutA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
RealizePalette
SelectPalette
CreatePalette
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EVENT_SINK_GetIDsOfNames
ord693
ord695
ord588
MethCallEngine
EVENT_SINK_Invoke
ord516
ord517
ord518
ord629
ord660
ord661
ord558
ord666
ord667
Zombie_GetTypeInfo
ord592
ord300
ord301
ord595
ord598
ord306
ord520
ord307
ord522
ord632
ord526
EVENT_SINK_AddRef
ord561
ord562
DllFunctionCall
ord563
ord670
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord314
ord606
ord315
ord607
ord316
ord608
ord716
ord717
ord319
ProcCallEngine
ord537
ord644
ord647
ord649
ord573
ord681
ord685
ord100
ord320
ord321
ord616
ord617
ord618
ord619
ord581
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsFree
CloseHandle
UnmapViewOfFile
LocalFree
TlsGetValue
TlsSetValue
LocalAlloc
TlsAlloc
MapViewOfFile
GetLastError
CreateFileMappingA
GetCurrentThreadId
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
FlushFileBuffers
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
ExitProcess
TerminateProcess
GetCurrentProcess
SetLastError
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
SetConsoleCtrlHandler
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
Sleep
SetStdHandle
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetEnvironmentVariableA
UnhookWindowsHookEx
SendMessageA
SetWindowsHookExA
CallNextHookEx
InstallFilterDLL
SetSharedData
UnInstallFilterDLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ