_gAntiSnapshot@4
_gBezierMov@20
_gDllInject@16
_gForceDeleteFile@4
_gGetProcessModule@16
_gInitDriver@4
_gMouseMove@12
_gPEShellocdeInject@16
_gProtectWindow@4
_gReadProcessMemory@20
_gWriteProcessMemory@20
Behavioral task
behavioral1
Sample
DriverDllX32.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
DriverDllX32.dll
Resource
win10v2004-20240611-en
Target
DriverDllX32.dll
Size
5.9MB
MD5
b496f3cbd15442c39d2139b466cfe43b
SHA1
f061aa49f58e084f1bb7a3aecdff5634f63fa792
SHA256
404cb730e6ecdecfc4326666ba096d596b673c5a7093c58828c3c05e3ab4c446
SHA512
082bf24069cd480558e763e806b59df8467ec2b65a94e834b9d22540f7318598b7486fd36c8972cac6dc3c9a685937ccc301b65158e9992007d40f44a0b776ae
SSDEEP
98304:02OLUEK/mzqIy2FGLJ5clSLiP2auQ9USBXA3dT6eeNhyDORCjGue/Kv1FSE9:BOwf/d2FGL0keP4TkUOinWEnSo
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
DriverDllX32.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
MessageBoxA
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
CreateServiceA
?_Xlength_error@std@@YAXPBD@Z
InternetOpenA
__CxxFrameHandler3
_crt_atexit
malloc
_ftime64
rand
fputc
isalnum
atoi
_lock_file
_libm_sse2_pow_precise
WTSSendMessageW
_gAntiSnapshot@4
_gBezierMov@20
_gDllInject@16
_gForceDeleteFile@4
_gGetProcessModule@16
_gInitDriver@4
_gMouseMove@12
_gPEShellocdeInject@16
_gProtectWindow@4
_gReadProcessMemory@20
_gWriteProcessMemory@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ