??����?��??��yD��
??����D��??��yD��
?a?��
?��?��
?��?��1
RunDllHostCallBack
Behavioral task
behavioral1
Sample
7a3594c674104c06086220fc6fddf214.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a3594c674104c06086220fc6fddf214.dll
Resource
win10v2004-20231215-en
Target
7a3594c674104c06086220fc6fddf214
Size
812KB
MD5
7a3594c674104c06086220fc6fddf214
SHA1
d1ebe6f4107d922e6bb0819c0e04330505e9a04c
SHA256
9358d6ec43bbb528be937788669a284036e4cdbb37432b1f5ae9c80090a7118e
SHA512
b7e1d07ab75c036b6373db1decf7127e07b08d356b69c36e93965180f1e0ee43b38ea817d18482208488c0ca9f856562b4daf67382c2c7274623363ba9cbac3c
SSDEEP
24576:UCTO9aNRdZvuvSjHWZHtB7klFgBf+a41:UiHTdthj2ZNBAliF+a4
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
7a3594c674104c06086220fc6fddf214 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
CloseClipboard
SetWindowOrgEx
waveOutPause
DocumentPropertiesA
RegOpenKeyExA
ShellExecuteA
OleInitialize
UnRegisterTypeLi
ImageList_Destroy
accept
GetSaveFileNameA
??����?��??��yD��
??����D��??��yD��
?a?��
?��?��
?��?��1
RunDllHostCallBack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ