DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
Behavioral task
behavioral1
Sample
980456d71fe0eede34aea2afcadb115a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
980456d71fe0eede34aea2afcadb115a.dll
Resource
win10v2004-20231215-en
Target
980456d71fe0eede34aea2afcadb115a
Size
54KB
MD5
980456d71fe0eede34aea2afcadb115a
SHA1
38547f1e8000cf42db1c24128fb032664852fd96
SHA256
ca80386ecca48067f669f4642ecada45d653ba812ef6a04fca39d4007956a818
SHA512
519ba6a2375ca277870ae61119e7fe0279c4c69994197f74d1e38834ca7521577025d9914e454f1a22a266434624f6c52b01c1bc4820b460f51fa622c8d7f727
SSDEEP
768:KNSqqNzctnK75oVkfn6fPo/auD/z3zyN7/V8XG5nTjJrK4nsbiPA/qT+45JpQ6:FqqNz0K7N6qpDA5yG5nTjUtWSW
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
980456d71fe0eede34aea2afcadb115a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileStringA
IsBadReadPtr
CreateThread
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualAlloc
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
Process32Next
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
DeleteFileA
ReadFile
GetFileSize
GetTickCount
lstrcmpiA
lstrcmpA
GetCurrentProcess
ExitProcess
GetTempPathA
lstrcatA
Sleep
lstrlenA
lstrcpynA
lstrcpyA
CreateFileA
WriteFile
CloseHandle
VirtualProtect
GetSystemDirectoryA
OutputDebugStringA
SetWindowsHookExA
CallNextHookEx
GetForegroundWindow
GetClassNameA
EnumWindows
GetSystemMetrics
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
GetWindowInfo
PrintWindow
FindWindowA
UnhookWindowsHookEx
GetWindowThreadProcessId
IsRectEmpty
ReleaseDC
LoadImageA
GetDC
ShowScrollBar
EndDialog
GetWindowTextA
GetDlgItem
SetLayeredWindowAttributes
SetWindowLongA
GetWindowLongA
ExitWindowsEx
DialogBoxParamA
FindWindowExA
PostThreadMessageA
CreateCompatibleBitmap
BitBlt
DeleteObject
DeleteDC
GetDeviceCaps
StretchBlt
GetObjectA
SelectObject
CreateCompatibleDC
GetStockObject
SetTextColor
SetBkColor
GetDIBits
RealizePalette
SelectPalette
CreateDCA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCheckConnectionA
HttpQueryInfoA
InternetOpenUrlA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetQueryDataAvailable
HttpAddRequestHeadersA
inet_ntoa
gethostbyname
GdiplusStartup
GdipAlloc
GdipLoadImageFromFile
GdipFree
GdiplusShutdown
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipDisposeImage
GdipSaveImageToFile
GdipCloneImage
Netbios
atoi
free
malloc
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
strstr
memmove
strchr
strrchr
sscanf
DeleteSelf
Hookoff
Hookon
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ