HaHaInstall
HaHaUninstall
Install
ServiceMain
Behavioral task
behavioral1
Sample
c0cc529d7e0245250fb861681792b8ca.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0cc529d7e0245250fb861681792b8ca.dll
Resource
win10v2004-20240226-en
Target
c0cc529d7e0245250fb861681792b8ca
Size
74KB
MD5
c0cc529d7e0245250fb861681792b8ca
SHA1
76571ce235473c7bd25455ff785698a9e0d8f939
SHA256
e143017b401cec5c6d86f33a28940659122d56634486e845ff4c4c2384bd531e
SHA512
ff966c7a6e666b9d7f4ebe6d32d6c5cff2525c2035586f724f294adde803204457b0003d2a45bb52a350dd93c43977345023e46c73a689a7de36b80b8bb41a4b
SSDEEP
1536:yR/W8O9QhNYT7Vf3NFnToIf6BTr5Zs++++++++++++++++++++++++++++6+++Jq:yR/464Vf3NtTBf6BTr5ZpNbWn
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
c0cc529d7e0245250fb861681792b8ca |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
WinExec
MoveFileExA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
GetModuleFileNameA
GlobalMemoryStatusEx
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
CreateThread
WaitForSingleObject
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
SetLastError
lstrlenA
GetCurrentProcess
CopyFileA
FindFirstFileA
lstrcmpA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
LoadLibraryA
Sleep
GetProcAddress
GetLogicalDriveStringsA
lstrcpyA
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
keybd_event
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
wsprintfA
CreateCompatibleBitmap
BitBlt
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ControlService
RegQueryValueA
RegOpenKeyExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ShellExecuteA
wcstombs
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
_ui64toa
_strlwr
_ftol
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
strncat
sprintf
strncpy
??2@YAPAXI@Z
strstr
__CxxFrameHandler
capCreateCaptureWindowA
capGetDriverDescriptionA
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
WSAIoctl
HaHaInstall
HaHaUninstall
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ