Behavioral task
behavioral1
Sample
55d71605159242450db636f702aa0d7b3f8853058eb9d387eee2cf8231145355.exe
Resource
win10-20220901-en
General
-
Target
55d71605159242450db636f702aa0d7b3f8853058eb9d387eee2cf8231145355
-
Size
3.8MB
-
MD5
c6fb5f2c779bc9f4b8aa04766e0dfa3f
-
SHA1
ca70c20ebbfd0eb4376a20e1ed573657295d975a
-
SHA256
55d71605159242450db636f702aa0d7b3f8853058eb9d387eee2cf8231145355
-
SHA512
dc171fb1f3dda21019eb6444e169b2e68c07eefe6d1aa4343656ab25235a1e8480f574b9530c65f534949816bae6154658f2b744b1ae076e120a5867b4bd9e3d
-
SSDEEP
98304:M/5mJJ7EQ2QutM2EugydjwWGNl1mBB5F3Pnjx:M/5sZdk9jDjw1wH3P9
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
55d71605159242450db636f702aa0d7b3f8853058eb9d387eee2cf8231145355.exe windows x64
0c8ad046b8b4edfa981fdeb4295a63ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapFree
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
RegCloseKey
shell32
SHGetFolderPathW
winhttp
WinHttpSetOption
crypt32
CryptUnprotectData
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 861KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ