Begin
InstallHook
MainMonitor
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
Behavioral task
behavioral1
Sample
2395b2e89da5fdcc9f9d088008b57102.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2395b2e89da5fdcc9f9d088008b57102.dll
Resource
win10v2004-20231215-en
Target
2395b2e89da5fdcc9f9d088008b57102
Size
64KB
MD5
2395b2e89da5fdcc9f9d088008b57102
SHA1
b03fcaaf3e8eda63873d97157771fd9726a4a19b
SHA256
b2207373fe92cdbb09966a23cb6aa2e117e50d7441910140b0240f90bad5914a
SHA512
85b33f0e8a50119e8c907fee5b40ec40cc14f5e46586da9fa64ddd65130937e0916a45c5a95ddb1603c57d8f4b2da89ff95e3ddb99e03a2ea3020136135ee7f5
SSDEEP
1536:zASSTTaQe+BIsOe6TTzDJCz53YZbXpr3pt0:zAbn+eyPSqp5zpm
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
2395b2e89da5fdcc9f9d088008b57102 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessW
CloseHandle
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
CreateRemoteThread
GetModuleHandleW
VirtualAllocEx
WritePrivateProfileStringW
MoveFileW
GetPrivateProfileIntW
GetPrivateProfileStringW
DeleteFileW
FindClose
SetFileAttributesW
FindFirstFileW
GetFileSize
CreateFileW
ResumeThread
MultiByteToWideChar
WideCharToMultiByte
ExitThread
GetExitCodeThread
GetSystemTime
ReadFile
SetFilePointer
GetCommandLineW
OpenProcess
FlushFileBuffers
GetStringTypeW
GetStringTypeA
RtlUnwind
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
WriteFile
VirtualFree
HeapCreate
HeapDestroy
VirtualProtectEx
WriteProcessMemory
Sleep
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetSystemDirectoryW
TerminateProcess
GetEnvironmentStringsW
GetEnvironmentStrings
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualProtect
GetWindowThreadProcessId
GetSystemMetrics
ShowWindow
GetWindowLongW
DestroyWindow
FindWindowW
GetWindowTextW
GetParent
GetDlgItem
PostMessageW
MoveWindow
SetForegroundWindow
SetCapture
SendMessageW
EnumChildWindows
EnumWindows
WaitForInputIdle
GetClassNameW
gethostname
gethostbyname
WSAStartup
URLDownloadToFileW
Netbios
waveOutGetVolume
waveOutSetVolume
OpenProcessToken
RegDeleteKeyW
RegEnumValueW
RegCreateKeyW
RegOpenKeyExW
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
SHGetSpecialFolderPathW
Begin
InstallHook
MainMonitor
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ