Static task
static1
Behavioral task
behavioral1
Sample
4d2ae51aa53395e0eeef4fb0445426dd5432ed1c90579d0a03d2cf43255097a9.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4d2ae51aa53395e0eeef4fb0445426dd5432ed1c90579d0a03d2cf43255097a9.exe
Resource
win10v2004-en-20220112
General
-
Target
4d2ae51aa53395e0eeef4fb0445426dd5432ed1c90579d0a03d2cf43255097a9
-
Size
4.7MB
-
MD5
cd70d8d4bbca3d7e672ff737802d8054
-
SHA1
082469fc878167142351692ab1786a5332a6917b
-
SHA256
4d2ae51aa53395e0eeef4fb0445426dd5432ed1c90579d0a03d2cf43255097a9
-
SHA512
49690afc68f16d505dc5c999f8790864a267eec8b9621316ba5bd7b8d1af48d9df62dfdbb455c573cd820895e10b411c1b0bf81482cf08087b0d1313374a4952
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
4d2ae51aa53395e0eeef4fb0445426dd5432ed1c90579d0a03d2cf43255097a9.exe windows x86
58435290dcc75b122641951f08ff6c21
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
wtsapi32
WTSSendMessageW
user32
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ