Buster_BSA wrote:If I am not wrong this malware (MD5: 3e50b76c0066c314d224f4fd4cbf14d5) does API hooking.
Yes.
Could someone put a list of hooked APIs, please? I need the information for an improvement in Buster Sandbox Analyzer.
[1176]explorer.exe-->ws2_32.dll-->send, Type: Inline - RelativeJump 0x71A94C27-->02100000 [unknown_code_page]
[1176]explorer.exe-->ws2_32.dll-->WSASend, Type: Inline - RelativeJump 0x71A968FA-->02120000 [unknown_code_page]
[1672]IEXPLORE.EXE-->ws2_32.dll-->send, Type: Inline - RelativeJump 0x71A94C27-->02FC0000 [unknown_code_page]
[1672]IEXPLORE.EXE-->ws2_32.dll-->WSASend, Type: Inline - RelativeJump 0x71A968FA-->02FD0000 [unknown_code_page]
Additional question: how many bytes are changed for the JMP?
Depends on how implemented this JMP. It can be instruction patch, short-to-long jump or complete code overwrite. For most common at x86-32 it will be size of address + JMP instruction -> 5 bytes.
I would say it hooks CreateProcess API and I do not see it listed in that post.
It does not hook this API.