Run
Start
Behavioral task
behavioral1
Sample
ebec709ce266156dd5ab84e464fd1eb7524181f283c7121a557cc96fadcfbb43.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebec709ce266156dd5ab84e464fd1eb7524181f283c7121a557cc96fadcfbb43.dll
Resource
win10v2004-20240226-en
Target
ebec709ce266156dd5ab84e464fd1eb7524181f283c7121a557cc96fadcfbb43
Size
2.3MB
MD5
d070cf19b66da341f64c01f8195afaed
SHA1
69b83dd12233b491cb5c2424eb80cd55975d7192
SHA256
ebec709ce266156dd5ab84e464fd1eb7524181f283c7121a557cc96fadcfbb43
SHA512
6c9f6da64b29affb335373aa599f2953fe0d1e2696807e66abc75222e43d55bb335c086fd2037fd783a3778fa2706dbd636f6a37febeed339482cee721fb4039
SSDEEP
49152:+5R1w38NwpyH8ztTYz8Imk3E1UtBHWy+As5QGKcVg3Wv:+cdpycZYzpLE2rHWy1sGZcKmv
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
ebec709ce266156dd5ab84e464fd1eb7524181f283c7121a557cc96fadcfbb43 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
Run
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ