RunDllHostCallBack
VMP����?������???a��?
VMP����?������???��?2
Behavioral task
behavioral1
Sample
VirusShare-00c829cf105d571bf18975f94c1a9267.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-00c829cf105d571bf18975f94c1a9267.dll
Resource
win10v2004-20231215-en
Target
VirusShare-00c829cf105d571bf18975f94c1a9267
Size
1016KB
MD5
00c829cf105d571bf18975f94c1a9267
SHA1
3bf69e25bc211c111e7d1a7d54accd4f0fc14e3f
SHA256
a7fb0be801015a0febfaf1d6fb4146bb96e160094c9da656b30b3325440af819
SHA512
eaa3b9804ab5581c9546d9fd6574de6f41bfe80f3df7a0b17aad4f0c2cff220dc7e7f060336fa1c450508e11357273f68b78a54d5557536c8c7acbbd10eac62d
SSDEEP
24576:spi3+FCrXe7IzDiuyJQ42lBPGA4D1nnEwfaQXKG7Tqxow:7OmuXJQtEEwicKG6xo
resource | yara_rule |
---|---|
sample | INDICATOR_EXE_Packed_VMProtect |
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
VirusShare-00c829cf105d571bf18975f94c1a9267 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
midiStreamOpen
WSACleanup
GetLocalTime
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
UnhookWindowsHookEx
GetStretchBltMode
DocumentPropertiesA
RegQueryValueA
ShellExecuteA
OleUninitialize
LoadTypeLi
ord2
ImageList_Destroy
ChooseColorA
RunDllHostCallBack
VMP����?������???a��?
VMP����?������???��?2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ