debug_msgbox
debug_showmsg
fuckyou
Behavioral task
behavioral1
Sample
c92691a56dc372c49a1e304aa053f353.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c92691a56dc372c49a1e304aa053f353.dll
Resource
win10v2004-20240226-en
Target
c92691a56dc372c49a1e304aa053f353
Size
1.2MB
MD5
c92691a56dc372c49a1e304aa053f353
SHA1
ae223b774769e45d34f78494150996251a289cae
SHA256
74f65a16c49015517726abb4862da604035b5c435f171414197b3b52788ec8ad
SHA512
63a520852a11c8b3fd3117cec079a586136588f653e89f46a62b7614da88669a4360b9a7066bbf4b4c28c6d1fdea3e265eb67414e41e16f059777d68400fd5bb
SSDEEP
24576:KppmlK7t7NnG65vi9myvPmi+0I2AzAQ8CNuKmH5:KpEK94pFPJ+0I2YAQpuKmZ
resource | yara_rule |
---|---|
sample | themida |
Checks for missing Authenticode signature.
resource |
---|
c92691a56dc372c49a1e304aa053f353 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
GlobalFlags
GetCurrentDirectoryA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RaiseException
ExitProcess
TerminateProcess
GetCommandLineA
HeapAlloc
HeapFree
SetStdHandle
GetFileType
GetACP
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
GetFileAttributesA
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalReAlloc
TlsGetValue
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DuplicateHandle
FindNextFileA
FindFirstFileA
FindClose
MulDiv
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFree
WaitForSingleObject
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
LocalAlloc
FreeLibrary
lstrcpyA
EnterCriticalSection
lstrcpynA
GetLastError
SetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
Beep
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateThread
GetVersionExA
DeviceIoControl
GetSystemDirectoryA
CreateFileA
GetFileTime
Module32First
Module32Next
CreateToolhelp32Snapshot
Process32First
Process32Next
FindResourceA
InterlockedExchange
SizeofResource
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
SetErrorMode
GetCurrentProcessId
InterlockedIncrement
WritePrivateProfileStringA
ReadProcessMemory
VirtualProtect
VirtualProtectEx
WriteProcessMemory
CloseHandle
Sleep
GetPrivateProfileSectionA
GetCurrentProcess
GetVersion
GetModuleHandleA
GetProcAddress
OpenProcess
SetUnhandledExceptionFilter
GetTickCount
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetTickCount
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
LoadLibraryA
LoadLibraryW
FreeLibrary
GetModuleFileNameA
SetLastError
GetModuleHandleA
GetModuleHandleW
GetCurrentThreadId
GetCommandLineA
HeapAlloc
RaiseException
GetLastError
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
InitializeCriticalSectionAndSpinCount
VirtualQuery
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
ScreenToClient
AdjustWindowRectEx
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
ReleaseDC
GetDC
wvsprintfA
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
UnregisterClassA
LoadStringA
GetClassNameA
LoadCursorA
GetSysColorBrush
DestroyMenu
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenu
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
GetSubMenu
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
CallNextHookEx
ValidateRect
SetWindowsHookExA
SetCursor
PostQuitMessage
wsprintfA
GetLastActivePopup
IsWindowEnabled
SetWindowPos
MoveWindow
GetDlgCtrlID
GetWindowTextLengthA
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetParent
GetKeyState
PtInRect
SetFocus
KillTimer
SetTimer
PeekMessageA
WindowFromPoint
InflateRect
EnableWindow
PostThreadMessageA
GetWindowRect
OffsetRect
GetMessageA
TranslateMessage
DispatchMessageA
OpenClipboard
EmptyClipboard
GetMenuItemID
EndDialog
GetMenuItemCount
CallWindowProcA
PostMessageA
GetWindowTextA
IsWindow
SetClipboardData
CloseClipboard
MessageBoxA
SetWindowLongA
ShowWindow
GetClientRect
SetCapture
ReleaseCapture
GetCursorPos
ClientToScreen
ShowCursor
SetCursorPos
ModifyMenuA
DefWindowProcA
MapVirtualKeyA
SendMessageA
keybd_event
ExitWindowsEx
FindWindowExA
GetWindowThreadProcessId
IsWindowVisible
SetForegroundWindow
SetMenuItemBitmaps
MessageBoxW
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
ScaleViewportExtEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
CreateBitmap
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
InitiateSystemShutdownA
RegSetValueExA
ord17
ImageList_Destroy
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
PathFileExistsA
Netbios
PlaySoundA
debug_msgbox
debug_showmsg
fuckyou
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ