?����???3��
RunDllHostCallBack
Behavioral task
behavioral1
Sample
e14ef9bcd280d73a5a164b42c04ac521.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e14ef9bcd280d73a5a164b42c04ac521.dll
Resource
win10v2004-20240226-en
Target
e14ef9bcd280d73a5a164b42c04ac521
Size
920KB
MD5
e14ef9bcd280d73a5a164b42c04ac521
SHA1
e0f09882001a9ea2f9c1e11eb173ba7c88582429
SHA256
328546ee197e2aa5167195a9854e5218e08ca77d3ad36b29b910855c2f42d59a
SHA512
c3cd762099fe8bb76b92fab4550decd2fe3fa373285456d18b9288b9e08ad74104c25ad862fe85edebb7e9f5f5e894b5ad590591929d03c2e0b5e2fac120f05a
SSDEEP
24576:6Yqp8ncvq1KCsZhgBJT+cYQiHjESrS/y93s4f:6Dmcvq8FhgL+cYfHjESoE
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
e14ef9bcd280d73a5a164b42c04ac521 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
waveOutClose
getpeername
ReadFile
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
TranslateAcceleratorA
BitBlt
DocumentPropertiesA
RegOpenKeyExA
SHGetSpecialFolderPathA
OleUninitialize
LoadTypeLi
ord17
GetSaveFileNameA
?����???3��
RunDllHostCallBack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ