Install
RundllInstall
RundllUninstall
ServiceMain
Behavioral task
behavioral1
Sample
53c61e5ecaf0a4ae3c8026cd4a53c26d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53c61e5ecaf0a4ae3c8026cd4a53c26d.dll
Resource
win10v2004-20231215-en
Target
53c61e5ecaf0a4ae3c8026cd4a53c26d
Size
73KB
MD5
53c61e5ecaf0a4ae3c8026cd4a53c26d
SHA1
b498a887a32fd2398d3ac243341b5075a357ff92
SHA256
0ea019051d9035e66115c7f465bb405faf747bb159b61d67c5c9ddfde730c4dd
SHA512
8898d3931c373edae48b8caf0175af2fb8df2dca9e5886fce09e605cd3617eb863d19d1d8dd27a291d461cdb9e9d1a4deba86448a22288ca8d1f017352db4d17
SSDEEP
1536:NKPmhGjGsv4HV6dX/mFnToIf8Clkr5Z9xNjUYD70UEf:QmyE6dX/mtTBf8Clkr5Z9xNjUYDaf
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
53c61e5ecaf0a4ae3c8026cd4a53c26d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
lstrcpynA
WinExec
MoveFileExA
GetModuleFileNameA
GetTickCount
GetFileSize
CreateFileA
WriteFile
CreateThread
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
lstrcpyA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
Process32Next
lstrlenA
SetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
Sleep
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
keybd_event
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
GetDesktopWindow
SetCursorPos
CreateCompatibleBitmap
BitBlt
CreateDCA
GetDIBits
CreateCompatibleDC
SelectObject
DeleteObject
DeleteDC
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
ShellExecuteA
SHGetFileInfoA
strstr
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
rand
wcstombs
_ftol
_strlwr
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
strncat
strncpy
sprintf
WSAStartup
shutdown
closesocket
connect
socket
htons
setsockopt
sendto
htonl
WSASocketA
inet_addr
gethostbyname
recv
send
capCreateCaptureWindowA
capGetDriverDescriptionA
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ