BR_Send
BR_SetSvrAckHandler
BR_SetSvrIP
BR_UserInit
Behavioral task
behavioral1
Sample
71fa93421e9bb7bd75ef67b7a0f11051db4e8014858e065ad3e161524846deec.dll
Resource
win7-20231215-en
Target
71fa93421e9bb7bd75ef67b7a0f11051db4e8014858e065ad3e161524846deec
Size
552KB
MD5
7efcf39239dca6fff3d6ef4264a63c23
SHA1
e2d5a96c85c70b4c7a52775a72486a239e1662b1
SHA256
71fa93421e9bb7bd75ef67b7a0f11051db4e8014858e065ad3e161524846deec
SHA512
e68e37a0e8ee2cf7fec7a0b60930a1704861673c4681660f9f543952950164e4706e2904d75374282d5333394df36585c1533fc832b915c41058ff1aac1108f8
SSDEEP
12288:/kc06HSrXDXUa729IBsztRSWpqCH9TH/sdsBmb1Il/Oon5/9X:/l06HSzjUaaRSWpXdLsSAJIdO4V
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
71fa93421e9bb7bd75ef67b7a0f11051db4e8014858e065ad3e161524846deec |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
Sleep
GetModuleFileNameA
CreateDirectoryA
WriteFile
CreateFileA
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetCurrentProcessId
ReadFile
GetFileSize
WTSGetActiveConsoleSessionId
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
GetLastError
RtlZeroMemory
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
GetProcAddress
GetModuleHandleA
Process32Next
CloseHandle
Process32First
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
DeleteFileA
CreateToolhelp32Snapshot
HeapDestroy
GetEnvironmentVariableA
HeapCreate
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
TerminateProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
GetVersion
GetCurrentProcess
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
wsprintfA
DispatchMessageA
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
GetMessageA
TranslateMessage
GetFileTitleA
CreateProcessAsUserA
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CoUninitialize
CoInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
VariantClear
SafeArrayDestroy
SysAllocString
HttpOpenRequestA
InternetSetOptionA
InternetConnectA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
PathFileExistsA
WTSQueryUserToken
CreateEnvironmentBlock
SHGetSpecialFolderPathA
BR_Send
BR_SetSvrAckHandler
BR_SetSvrIP
BR_UserInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ