Install
RundllInstall
RundllUninstall
ServiceMain
Behavioral task
behavioral1
Sample
592b63dc9777582bcf8e53fc290965fa.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
592b63dc9777582bcf8e53fc290965fa.dll
Resource
win10v2004-20231215-en
Target
592b63dc9777582bcf8e53fc290965fa
Size
85KB
MD5
592b63dc9777582bcf8e53fc290965fa
SHA1
fde77b0c037b641d6e859d1362044ace485bd542
SHA256
b3618ecb0689c7af307ba4640c88ad60ad0d208fc5d8768bd85e03100755121d
SHA512
dd4052fa104cef88f6c336ac1d3a39575be60f36d9e6e361931ceb556d0d85a1bd2b73f8a53dd3367cd38f44426224eefaa13aa6a16a87c51aa4d1275ede3b8f
SSDEEP
1536:xwgB5VwbQkVHenXQFnToIfKTRnr5ZyNTe6UfNgqFYi8IUjA/sd:DoxenXQtTBfKTRnr5ZyNTe6YkBJIc
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
592b63dc9777582bcf8e53fc290965fa |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
lstrcpynA
WinExec
MoveFileExA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
CreateThread
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
lstrlenA
SetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
Sleep
FindClose
GetDriveTypeA
lstrcpyA
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
ExitWindowsEx
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
GetDesktopWindow
wsprintfA
keybd_event
OpenDesktopA
CreateCompatibleBitmap
BitBlt
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
ShellExecuteA
SHGetFileInfoA
wcstombs
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
_strlwr
_ftol
strstr
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
__CxxFrameHandler
strncat
sprintf
strncpy
??2@YAPAXI@Z
capCreateCaptureWindowA
capGetDriverDescriptionA
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
setsockopt
WSAIoctl
send
StrStrIA
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ