Behavioral task
behavioral1
Sample
86226b26db102b7946f9e3b9f77ba6871ddf8a02a4b1250e5a191b4d43388fe8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86226b26db102b7946f9e3b9f77ba6871ddf8a02a4b1250e5a191b4d43388fe8.dll
Resource
win10v2004-20220812-en
General
-
Target
86226b26db102b7946f9e3b9f77ba6871ddf8a02a4b1250e5a191b4d43388fe8
-
Size
152KB
-
MD5
67d6d6d607e9b2b893b3eba90788118e
-
SHA1
977840cc8a90895d1bee148c5070b98d51300ae9
-
SHA256
86226b26db102b7946f9e3b9f77ba6871ddf8a02a4b1250e5a191b4d43388fe8
-
SHA512
a8b20efcf3440011f880c6a6a17cb04190768d5cb04abcd6964808d366d8736633557c2814bdf45334cd6ba68e84305d9a439ab54aa8a7f7a2cadfbd1aa0d85b
-
SSDEEP
3072:VByT+GLxV88o8BOolXFoGzjlSYv2991EqHUqrz834IXFaHVtZ:583Dl1hzjjvGfEq0qroII0HVtZ
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
86226b26db102b7946f9e3b9f77ba6871ddf8a02a4b1250e5a191b4d43388fe8.dll windows x86
19a6ab67a8cf77c89b7b2951336cf9c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsW
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
ReleaseDC
gdi32
TextOutA
advapi32
RegQueryValueExA
Sections
.text Size: - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ