Behavioral task
behavioral1
Sample
33f20565adb503309afe36ad032a320cf0e7a9c788b5292b1d7ebbc3d2d8b66d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33f20565adb503309afe36ad032a320cf0e7a9c788b5292b1d7ebbc3d2d8b66d.exe
Resource
win10v2004-20220812-en
General
-
Target
33f20565adb503309afe36ad032a320cf0e7a9c788b5292b1d7ebbc3d2d8b66d
-
Size
4.3MB
-
MD5
8756be80417794437915e79235830322
-
SHA1
4a9e55f8623080cca2f1d8cb31f5ba76b3332899
-
SHA256
33f20565adb503309afe36ad032a320cf0e7a9c788b5292b1d7ebbc3d2d8b66d
-
SHA512
0817d8caf97132e1cfa2cbf22a30efe67c59955ca562c784f4f960944d4e038d91c0ef6071412455829ee2db0e23e0f838b6f8d9fd4aba389dedc0442ca44001
-
SSDEEP
98304:4+Ydt7Z9F6CsHgeCam7kxYwGWHpkd5gfxIEJageqSjkG/:etZ9MTHjCam7/Ukd5gpLJreTgG
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
33f20565adb503309afe36ad032a320cf0e7a9c788b5292b1d7ebbc3d2d8b66d.exe windows x86
9a03d550664996668cc5b89580693e11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
FindResourceW
DeleteCriticalSection
LoadLibraryW
GetProcAddress
FreeLibrary
SetLastError
GetCommandLineW
FindNextFileW
GetModuleFileNameW
FindClose
GetCurrentThreadId
MultiByteToWideChar
GlobalFlags
GetSystemInfo
GetCurrentDirectoryW
SetCurrentDirectoryW
WideCharToMultiByte
VirtualQuery
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
ResetEvent
GetSystemTimeAsFileTime
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
FreeResource
MulDiv
HeapSize
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
LCMapStringW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
DecodePointer
GetStdHandle
GetCommandLineA
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RaiseException
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LockResource
InitializeCriticalSection
SizeofResource
MapViewOfFile
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GlobalSize
LeaveCriticalSection
EnterCriticalSection
CreateFileW
GetLastError
ReadFile
WriteFile
IsDebuggerPresent
CreateEventW
SetThreadPriority
SetEvent
GetCurrentProcessId
GetTempPathW
GlobalReAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
Sleep
ExitProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateThread
SetPriorityClass
GetCurrentProcess
CloseHandle
TerminateProcess
OpenProcess
WriteConsoleW
SetEndOfFile
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetActiveWindow
SystemParametersInfoW
IsWindow
DestroyWindow
RemovePropW
SetPropW
GetWindowDC
GetPropW
GetWindowThreadProcessId
GetForegroundWindow
DestroyIcon
DestroyCursor
GetFocus
SetFocus
GetMessageW
TranslateMessage
DispatchMessageW
GetSystemMetrics
GetCursorInfo
keybd_event
ReleaseDC
GetDC
LoadImageW
GetParent
LoadCursorW
LoadIconW
RegisterClassW
GetClassInfoW
LoadStringW
SendMessageW
MessageBoxW
CreateWindowExW
DefWindowProcW
GetWindowLongW
EnumDisplaySettingsW
SetClipboardData
EnumWindows
EmptyClipboard
CloseClipboard
OpenClipboard
MonitorFromWindow
wsprintfW
GetDesktopWindow
CharUpperBuffW
MessageBoxW
gdi32
SetDIBColorTable
StretchBlt
RealizePalette
GetStockObject
GetDIBits
GetDeviceCaps
GetSystemPaletteEntries
DeleteDC
SelectPalette
CreatePalette
GetObjectW
SetStretchBltMode
DeleteObject
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
RegCreateKeyW
RegCloseKey
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CreateStreamOnHGlobal
CoUninitialize
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
hid
HidD_SetFeature
HidD_GetFeature
HidD_GetHidGuid
psapi
EnumProcesses
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
ws2_32
WSAStartup
WSACleanup
ioctlsocket
htons
recv
connect
socket
send
inet_addr
WSAAsyncSelect
select
closesocket
gethostbyname
gdiplus
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFile
GdipGetImageWidth
GdipSetCompositingMode
GdipGetImagePalette
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipBitmapLockBits
GdipFree
GdipGetImagePixelFormat
GdipDisposeImage
GdipDrawImageRectI
GdipAlloc
GdipCreateBitmapFromStream
GdipBitmapUnlockBits
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
wtsapi32
WTSSendMessageW
Sections
.text Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 545KB - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 859KB - Virtual size: 859KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ