GetModuleHandle64
GetProcAddress64
GetThreadContext64
ReadProcessMemory64
SetLastErrorFromX64Call
SetThreadContext64
VirtualAllocEx64
VirtualFreeEx64
VirtualProtectEx64
VirtualQueryEx64
WriteProcessMemory64
X64Call
Static task
static1
Behavioral task
behavioral1
Sample
6dc5fcbd3d05cb11dc4731aea996c7cbc213253c4d4b119799c5ddedebe537fb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6dc5fcbd3d05cb11dc4731aea996c7cbc213253c4d4b119799c5ddedebe537fb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee.exe
Resource
win10v2004-20241007-en
Target
darkvision.zip
Size
1.5MB
MD5
7ebbc15bcd7ffb54e10ef95d37f91466
SHA1
983f759873248e1cc149dde05272f27cecee7d8d
SHA256
2ef00351268aea7fb093b96a3ed32cbf1128aff405d38c12114ca6e3768b24f3
SHA512
d87dcf90fc7497e139cfb69374e6eb42f022cdc0bc2f575540e6d4782562b056501609b6409587468b4433a488d004639c5e123634f3c3ace5e71e393cdda2e8
SSDEEP
49152:kNu3AfUgDQMWxzqXSLGvYDmw1H7LYEPA2KuwyA:V6nWxzqScY5BLYEPA2KuwT
Checks for missing Authenticode signature.
resource |
---|
unpack001/6dc5fcbd3d05cb11dc4731aea996c7cbc213253c4d4b119799c5ddedebe537fb |
unpack001/9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WriteFile
WriteConsoleW
WerSetFlags
WerGetFlags
WaitForMultipleObjects
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
TlsAlloc
SwitchToThread
SuspendThread
SetWaitableTimer
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
RtlVirtualUnwind
RtlLookupFunctionEntry
ResumeThread
RaiseFailFastException
PostQueuedCompletionStatus
LoadLibraryW
LoadLibraryExW
SetThreadContext
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStdHandle
GetQueuedCompletionStatusEx
GetProcessAffinityMask
GetProcAddress
GetErrorMode
GetEnvironmentStringsW
GetCurrentThreadId
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateWaitableTimerExW
CreateThread
CreateIoCompletionPort
CreateFileA
CreateEventA
CloseHandle
AddVectoredExceptionHandler
AddVectoredContinueHandler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenMutexW
GetLastError
OpenEventW
Wow64DisableWow64FsRedirection
ExitProcess
CreateThread
LocalFree
lstrcpyW
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetProcAddress
GetModuleHandleW
lstrlenW
InterlockedDecrement
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleFileNameW
lstrcmpiW
LocalAlloc
lstrcpyA
CloseHandle
LoadLibraryW
DeleteFileW
WriteFile
CreateFileW
CreateDirectoryW
Sleep
GetCommandLineW
VirtualFree
LoadLibraryA
VirtualAlloc
RemoveDirectoryW
WaitForSingleObject
ReadFile
GetFileSize
CreateEventW
SetEvent
ResumeThread
CreateMutexW
lstrlenA
WaitForMultipleObjects
ReleaseMutex
GetModuleHandleA
TerminateThread
GetExitCodeThread
GetNativeSystemInfo
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
VirtualProtect
GetTickCount
GetComputerNameExW
GetUserGeoID
GetCurrentProcessId
GetFileAttributesExW
HeapReAlloc
WriteConsoleW
SetStdHandle
HeapSize
GetStringTypeW
LCMapStringW
FlushFileBuffers
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
wsprintfW
GetAsyncKeyState
wsprintfA
GetForegroundWindow
SetWindowTextW
MessageBoxW
DefWindowProcW
RegisterClassW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
UnregisterClassW
PostMessageW
CreateWindowExW
CoCreateInstance
VariantClear
VariantInit
SysFreeString
SysAllocString
GetModuleHandle64
GetProcAddress64
GetThreadContext64
ReadProcessMemory64
SetLastErrorFromX64Call
SetThreadContext64
VirtualAllocEx64
VirtualFreeEx64
VirtualProtectEx64
VirtualQueryEx64
WriteProcessMemory64
X64Call
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ