KillOld
SetHook
runform
testform
Behavioral task
behavioral1
Sample
01cc65af7cbaa66b3e9ce63901848183.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01cc65af7cbaa66b3e9ce63901848183.dll
Resource
win10v2004-20231215-en
Target
01cc65af7cbaa66b3e9ce63901848183
Size
275KB
MD5
01cc65af7cbaa66b3e9ce63901848183
SHA1
6531570b1ebfa8c1f82fec979e5c757939e3e48b
SHA256
cabf1949d6682f1c84140199ee44c838ddff5a08d25c2c5f6eb01bd2ac4bacde
SHA512
92afe1de416c121d5f26303d1201592aea5c18254fc24eb6f0aca161742fb0691997262448b8d2083313ebaf11563b73e2f828f2128e22c9dafd2f0e2516c49c
SSDEEP
3072:JUb4Ok+0qGzca35CnD4vx8R05kdzmQnj:eb4Ok+mlpYD4c05RE
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
01cc65af7cbaa66b3e9ce63901848183 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetComputerNameA
ResetEvent
CreateEventA
WaitForSingleObject
SetEvent
ExitThread
lstrcatA
GetTempPathA
CreateProcessA
CreatePipe
PeekNamedPipe
GetVolumeInformationA
GetVersionExA
GetCurrentProcess
CreateDirectoryA
GetSystemTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDiskFreeSpaceA
CopyFileA
LoadLibraryA
FreeLibrary
GetSystemDirectoryA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenMutexA
GetModuleFileNameA
ExitProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GlobalMemoryStatus
GlobalLock
LCMapStringW
LCMapStringA
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
DeleteCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
GlobalAlloc
GlobalUnlock
GlobalFree
GetFileSize
lstrcmpA
Sleep
OpenProcess
TerminateProcess
GetModuleHandleA
GetProcAddress
FindFirstFileA
lstrlenA
FindNextFileA
FindClose
GetDriveTypeA
ReadFile
CreateThread
CreateFileA
SetFilePointer
WriteFile
DeleteFileA
CloseHandle
MoveFileA
lstrcpyA
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
InitializeCriticalSection
GetLastError
LeaveCriticalSection
EnterCriticalSection
HeapSize
GetVersion
GetCommandLineA
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
RaiseException
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSaveKeyA
RegLoadKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegCloseKey
ControlService
DeleteService
OpenServiceA
QueryServiceStatus
OpenSCManagerA
CloseServiceHandle
GetDeviceCaps
GetIpAddrTable
Shell_NotifyIconA
SHFileOperationA
ShellExecuteExA
ShellExecuteA
UnregisterClassA
CreateWindowExA
RegisterClassA
DestroyWindow
DispatchMessageA
GetMessageA
CharLowerA
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
FindWindowA
EnumWindows
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
ShowWindow
SetWindowsHookExA
MessageBoxA
GetForegroundWindow
GetKeyState
CallNextHookEx
ExitWindowsEx
SendMessageA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
WindowFromPoint
GetCursorPos
ReleaseDC
GetDC
mouse_event
UpdateWindow
SetWindowLongA
GetWindowLongA
DefWindowProcA
UnhookWindowsHookEx
PostThreadMessageA
GetWindow
SetWindowTextA
GetTopWindow
SetForegroundWindow
PostQuitMessage
LoadIconA
SetTimer
SetCursorPos
HttpQueryInfoA
InternetReadFile
InternetSetFilePointer
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetQueryOptionA
InternetCloseHandle
WSASocketA
WSACreateEvent
WSAEventSelect
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSACloseEvent
WSAConnect
KillOld
SetHook
runform
testform
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE