Behavioral task
behavioral1
Sample
c6d11e4728745c3629a963c32a4ede933220103f78784d5f55d7419674674cec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d11e4728745c3629a963c32a4ede933220103f78784d5f55d7419674674cec.exe
Resource
win10v2004-20220812-en
General
-
Target
c6d11e4728745c3629a963c32a4ede933220103f78784d5f55d7419674674cec
-
Size
55KB
-
MD5
9abc3c50b4eafeef7d37cf0c2de01e8a
-
SHA1
8195269ea07b565410ae56a3864f6d6b75d42b94
-
SHA256
c6d11e4728745c3629a963c32a4ede933220103f78784d5f55d7419674674cec
-
SHA512
ad33ee34bde6059f38197590bdc8b9ab328b4bb7466bf69e5297b923612fac214ee0c53fb5bba2d71b5fbe7ac91b865b60e57293ebab05a8658b5ecd8092baac
-
SSDEEP
1536:9vyb/vDxqiXgBBt2EoQ7LmNH/QaTl8mT0n:s/vc2E9XmNf9J8mk
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
c6d11e4728745c3629a963c32a4ede933220103f78784d5f55d7419674674cec.exe windows x86
b67c7f63d79f478645b3be85c7930f50
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExGetPreviousMode
RtlUnicodeStringToAnsiString
ZwSetValueKey
KeDelayExecutionThread
ZwCreateFile
PsCreateSystemThread
ZwQueryValueKey
ZwQueryDirectoryFile
PsTerminateSystemThread
ZwDeleteFile
ZwQueryInformationProcess
ZwCreateSection
ZwDeleteKey
ZwLoadDriver
ZwEnumerateKey
ExAllocatePoolWithTag
ExFreePoolWithTag
_wcsnicmp
ZwWriteFile
KeDetachProcess
IoGetCurrentProcess
MmMapViewOfSection
ObReferenceObjectByHandle
KeAttachProcess
ZwOpenProcess
KeServiceDescriptorTable
PsGetCurrentProcessId
MmIsAddressValid
ObfDereferenceObject
MmSectionObjectType
ZwOpenKey
ZwReadFile
MmUnmapViewOfSection
ObQueryNameString
RtlCompareUnicodeString
DbgPrint
ZwClose
IoCreateFile
wcslen
RtlInitUnicodeString
_except_handler3
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1024B - Virtual size: 710B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ