_gAntiSnapshot@4
_gBezierMov@20
_gDllInject@16
_gForceDeleteFile@4
_gGetProcessModule@16
_gInitDriver@4
_gMouseMove@12
_gPEShellocdeInject@16
_gProtectWindow@4
_gReadProcessMemory@20
_gWriteProcessMemory@20
Behavioral task
behavioral1
Sample
404cb730e6ecdecfc4326666ba096d596b673c5a7093c58828c3c05e3ab4c446.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
404cb730e6ecdecfc4326666ba096d596b673c5a7093c58828c3c05e3ab4c446.dll
Resource
win10v2004-20240704-en
Target
b496f3cbd15442c39d2139b466cfe43b.bin
Size
5.8MB
MD5
7913bf5e23f3b95b81270082a5c7d496
SHA1
3c5be19495e3c9a1a488f95a9a793aaae270601f
SHA256
120b469ae595d2276a13215be5ad4a1f049d5edbfbc50ff38fc46b8e06b641cb
SHA512
2741e963666cc570ec65585020c4f754a63cb51806c285007b5f65d6d9d73ab8f76de7df6d90338fa9f0ec688e2acf3e60bcbccd2252a7e9a2898d0d4016f646
SSDEEP
98304:4ZY1zSlj/J33ul9JRqsUR7Qj5EyKzHjmkHwg8ecrZf1pxuO8i837CjMY5IhOiD88:4ezSlLJ3oPqsUJQj5b+y/g85VXQlr8Mx
resource | yara_rule |
---|---|
static1/unpack001/404cb730e6ecdecfc4326666ba096d596b673c5a7093c58828c3c05e3ab4c446.dll | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
unpack001/404cb730e6ecdecfc4326666ba096d596b673c5a7093c58828c3c05e3ab4c446.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
MessageBoxA
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
CreateServiceA
?_Xlength_error@std@@YAXPBD@Z
InternetOpenA
__CxxFrameHandler3
_crt_atexit
malloc
_ftime64
rand
fputc
isalnum
atoi
_lock_file
_libm_sse2_pow_precise
WTSSendMessageW
_gAntiSnapshot@4
_gBezierMov@20
_gDllInject@16
_gForceDeleteFile@4
_gGetProcessModule@16
_gInitDriver@4
_gMouseMove@12
_gPEShellocdeInject@16
_gProtectWindow@4
_gReadProcessMemory@20
_gWriteProcessMemory@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ