HaHaInstall
HaHaUninstall
Install
ServiceMain
Behavioral task
behavioral1
Sample
8f955d579de7647082e25f64adb9f7a7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f955d579de7647082e25f64adb9f7a7.dll
Resource
win10v2004-20231215-en
Target
8f955d579de7647082e25f64adb9f7a7
Size
78KB
MD5
8f955d579de7647082e25f64adb9f7a7
SHA1
025516d174386d48f7c0153dfa9b01eba034a867
SHA256
7b4fb24afd25362797800de6b5ef0be379015e87f307563953f63897e3e43a60
SHA512
ac82a93c20611a5e4a81ba832872352e1eccf29efaef2c2cababbc0fee580c211d1f3547660c4808d14b0cab81c0812b9bdc4d2228f297c05d84a94cbcc218f5
SSDEEP
1536:EKHQf6HsDYcBauXeCvFnToIfYtLi0r++++++++++++++++++++++++++++H+++wV:EslsDYTuXeCvtTBfYtLi0MNjzq1qLc
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
8f955d579de7647082e25f64adb9f7a7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
FreeConsole
GlobalMemoryStatusEx
MoveFileExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WinExec
lstrcpynA
GetModuleFileNameA
CreateThread
WaitForSingleObject
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
lstrcmpiA
SetLastError
lstrlenA
GetCurrentProcess
MoveFileA
FindFirstFileA
lstrcmpA
GetLastError
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
Sleep
GetLogicalDriveStringsA
lstrcpyA
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
GetVersionExA
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
mouse_event
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
ExitWindowsEx
SetThreadDesktop
keybd_event
SetCursorPos
wsprintfA
SelectObject
GetDIBits
CreateDCA
DeleteDC
CreateCompatibleDC
BitBlt
DeleteObject
CreateCompatibleBitmap
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
CloseServiceHandle
QueryServiceStatus
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
ShellExecuteA
_ui64toa
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
_strlwr
wcstombs
_ftol
strcspn
atoi
??3@YAXPAX@Z
strchr
strncat
sprintf
strncpy
??2@YAPAXI@Z
strstr
_except_handler3
__CxxFrameHandler
_CxxThrowException
SHDeleteKeyA
capCreateCaptureWindowA
capGetDriverDescriptionA
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
WSAIoctl
HaHaInstall
HaHaUninstall
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ