�;5�{��0�x>�X���.Ox���դ�+�� ~������9�DUF�s%�s�Y���l��J��lv��٨�2���#� +���y�~�)��(�{��Y��{��4=#�� �8L3v��)}� ���<q��C9�y��q>���A���bЋ_�V+a��������W�X9�F~�Y��nw����-(�g _�#��zN��lgdϴ��O���f�p&���M�� �\�YD��\�6n�Y��ӖĠ��oL���'��:���W����*�ĕ+!Cp�{���i�j�[�u����f���ғp6W�g~�����A�����^��HL�A��H�;����f�:"������w����z{[/�.έ�+�k�o� �F�uR�����ǭ�V��3I4+ۍe�XB���1��P<�̑����Y{�+H����͏�q�L��{����.F�L#/ @���vR���H�L$�#;����m�z�<�U���I���0}������z� �JeW��� ��3�&%�L+�y����6� �%]4|��������~U���/uZ��A��*�xOx7G�Ӎ��ģ5g�l��/� ��S��W7�cf��o�xWܔ/W�2� ��\�V҂U|�H(��JSi���l�vr_� !�R��y��j��j�8<��s��2�tҫ&��l�������J���F��9�� �WTX�Ta��>㶁 �s�**nL�J�$�O�,���%s5Vc�#�`N`F}��)�]K\���,�Y���g_�KE��vZ��UI���V �j;���c`*��Q�P4�p�H ?Nӵ��^C�����>ך��e2^�$S�a�`� �Ȟ-U��ʫ"p�LvR��L$t �B����0[z�ͫ��9�M'��Y�=�$�Z��oY���oY[M,~}q�/�ajRA-���-��@,�p~]�^���Q� zN�A����.ȇ|�9e�A.ek��3L�ـ�#�=�V1����xL)Rag��.�M7��kzF0�@�ˀ�;�� B��jCMcЛ�^<5vt���fo& \���9�(r��Be������w��cx�7h���a�?|�*]��Wz��bc�wg6 ���>�ͭ����~-�ʻ�!_0{3��������l��#�^*���'0�~��G/ʛ�����A��.�~���^ǘ$�� 0�����$r��)ߠ��h}��<�L����8A�Fx�AJ�_��.ޒ�x�y���\�g�>����4q�'�#�Bx�x��6�+���Q҇�����v�o�t���`����6��3oTK�*]�%%(kCB�Ȧu���q7I���M2s�~�yA���C<yi2�ݨ�/wz���xd{hA n�k��F���N�O�~��?��y ������#�p����Fp~�s݆��,���Yn�.� -��v����6��� �Y ���M�߶�)�C��Dži���4���r� !=�?�w��˷��o_ ��(>��Q>?.el#��k3�L�������+��nZ����]l:5��5�ÿK�������Ѫ�4Ǜ��0��-�Hj��!Zmf��";���3dɉ�;���� �'�'*E%"�sczW��D�0��&�jUO-��d���U:�qo'�jW{p�FD�5E�ڰ�`S����J�+���T�c��E��PR�K���*/PQ'�R=fږ��~ ��5���3&��"˟C���z�]I0)�9���;*�fg��Z�h��1�g%N�}>�C�ͥ�Ks��%���¸�c��Ng�1o�Kj4��p��\�;t�����ɆdWH|�nv�c��+4j�UT�<Q�Lr�ƺ��pf���Q+[d�b�ނ��9|�j���q��ZXA+�n�JY_�t�|f�8����0ʆ��'�6�� 5䥍�'&}F���EsX�]oX2b���R�XɏW����v2]�q��#�vP����]mL���[�^�v���T��(�a�㭥,H�� ���*���#ʥ�mB(� ��3:P�~_���{�*Uz�8|Q'({���.|�dt�?w%U̶�;�ū�ji�ݷ����;Ӏ�rUG|�:n�܃mfK%j��|�7�/u%2����?���G����4��oD8p,��"z�8�0�~pO�N�94ˉ�������T��<��+(���ji�[z1{���|�DP��P9S[O*����ȫ谣H��4��X��y�(��D��M�J��M�elW��XC��h��`ke$��� T��@��ͯ���h����OX���|��w+)��ocǺw5��#!�����K���7g6��������Ԕ���H̸綡��mEN�ʌ�4d���N.G�>\�(*YBUF��ᖍF(��.(m���BQ����3�_.��n`j�4�(�T�P��� �[�-Z���p�k���m4�|�Y�������16� ���j�MU3�.�e��-�f� C���"������:.^��#��ί;�?+���7�?������5�/�q���kÒڵ��� ���8?�k'�g�ۓ�V�Q�*L�����|o����w" �� �ͯ �8�S7���r.�h������L7���&�X�Q����l��;���oj�x-%�Z:�a]P"6�Pǒ�#��0�9%��M63�:Wh�����8�B%� m(�����Q#�����hۗ �����/�͆����b���w���F��÷���Ÿʹb<ݞ�����/�`���]kã�:� ��ڡ�� uF/�yZ���p�5��t����I��[�.,�\��j x�"�&ȇ�JA�/B����v��X$��W'SS���2�v<��F֠����'��:pt���(��fa9��iӍ��[� �A��\���%�dW�[IKmZ)�i�u�tV�rVP�~d��D � v&��=�?@����x�Q o�b�S w�Q��L�,����~����+P듘�Q�p*��ٟ�p-l���T��Hd��)������>�aL�ouţ�M:z��SY6����"��fZY��S�1�!0�w�`�� ��R$֊����(�Ҝ�ϙx9*��
Behavioral task
behavioral1
Sample
a8dbdf1c26c039c4fa9d37da734b36e3d5a6e1bbf082cba40be2e447c3601ac7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8dbdf1c26c039c4fa9d37da734b36e3d5a6e1bbf082cba40be2e447c3601ac7.exe
Resource
win10v2004-20220812-en
General
-
Target
a8dbdf1c26c039c4fa9d37da734b36e3d5a6e1bbf082cba40be2e447c3601ac7
-
Size
425KB
-
MD5
080331bdbb75b6a63c49658cb9ca8661
-
SHA1
0e6176efeb76f676a9a0c06bd939c6e6c0d9bfe5
-
SHA256
a8dbdf1c26c039c4fa9d37da734b36e3d5a6e1bbf082cba40be2e447c3601ac7
-
SHA512
3735126353b07ccee356a5b033631e2fbdd92b6078000ab58d3959b82813d5863e95c53442784d9dcf0baaf86b3ac4348fb3f2750f9532e10e9faf33aa88802a
-
SSDEEP
12288:udgGNFNR5Cq/5b+ln7hoU24ZgFV3n2Rw41qeP:udHvNR5rBgop42VX2Rw41qeP
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a8dbdf1c26c039c4fa9d37da734b36e3d5a6e1bbf082cba40be2e447c3601ac7.exe windows x86
5fecd6d49e44b5892fe6513ca19beacf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
SetStdHandle
GetFileType
GetACP
IsValidCodePage
HeapCreate
VirtualFree
SetErrorMode
GetStdHandle
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFileSizeEx
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetModuleHandleW
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FindNextFileA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
CreateEventA
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
FormatMessageA
LocalFree
MulDiv
lstrcpynA
GetProcAddress
GetModuleHandleA
SetLastError
GetCurrentProcess
GetFileSize
WriteFile
GetLastError
lstrlenA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
MultiByteToWideChar
GetTickCount
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
ExitProcess
TerminateThread
CreateMutexA
DeleteFileA
SetFilePointer
GetModuleFileNameA
ReadFile
CloseHandle
CreateFileA
FindClose
FindFirstFileA
ResetEvent
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
PostThreadMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
SetMenu
IsWindowVisible
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CopyRect
ClientToScreen
GetMessagePos
ScreenToClient
UpdateWindow
UnionRect
DrawEdge
DrawFrameControl
DrawFocusRect
GetFocus
GetKeyState
DispatchMessageA
TranslateMessage
ExitWindowsEx
SetForegroundWindow
SetActiveWindow
MessageBoxA
CopyIcon
LoadCursorA
InflateRect
ReleaseDC
GetParent
GetSysColor
IsWindow
SetWindowLongA
InvalidateRgn
SetRect
IsRectEmpty
SetCursor
SetCapture
EnableWindow
SendMessageA
CopyAcceleratorTableA
RedrawWindow
ReleaseCapture
PtInRect
LockWindowUpdate
InvalidateRect
PostMessageA
KillTimer
GetDC
GetWindowRect
DrawIcon
GetSystemMetrics
IsIconic
SetTimer
LoadMenuA
GetClientRect
AppendMenuA
RegisterClipboardFormatA
GetSystemMenu
LoadIconA
UnregisterClassA
CharUpperA
MessageBeep
GetNextDlgGroupItem
DestroyWindow
GetSysColorBrush
WindowFromPoint
GetWindowThreadProcessId
GetMessageA
GetCursorPos
ValidateRect
DestroyMenu
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
CharNextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetActiveWindow
gdi32
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SaveDC
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetRgnBox
SetTextColor
SetBkColor
GetClipBox
GetDeviceCaps
GetCurrentObject
GetTextExtentPoint32A
CreateFontIndirectA
GetStockObject
SetDIBColorTable
SelectObject
GetDIBColorTable
StretchBlt
CreateDIBSection
CreateCompatibleDC
DeleteDC
ScaleViewportExtEx
DeleteObject
GetObjectA
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CLSIDFromProgID
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VariantCopy
SysAllocStringByteLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
VariantClear
SysStringLen
SysFreeString
gdiplus
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCloneImage
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdiplusShutdown
GdipAlloc
GdipCreateBitmapFromStream
GdipFree
winmm
sndPlaySoundA
iphlpapi
GetAdaptersInfo
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
InternetReadFile
Exports
Exports
Sections
.text Size: - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 410KB - Virtual size: 410KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ