Behavioral task
behavioral1
Sample
a43c435aabcad33053f04e1ad2e8a5cf5304e0baf033accd200935abedc27f16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a43c435aabcad33053f04e1ad2e8a5cf5304e0baf033accd200935abedc27f16.exe
Resource
win10v2004-20220901-en
General
-
Target
a43c435aabcad33053f04e1ad2e8a5cf5304e0baf033accd200935abedc27f16
-
Size
200KB
-
MD5
6005a512e8f6637724ffd3ba8b8033c0
-
SHA1
4f4e848b60c4afb7db35ad64162e3561e2c88194
-
SHA256
a43c435aabcad33053f04e1ad2e8a5cf5304e0baf033accd200935abedc27f16
-
SHA512
df106a0ba3da468502172a8ef72ec9a04f426d92c399ee9940c3359b723e4397da1127ac9ce4c028b1a7f308f5391cbeaffb5a8f84d273b91d0311668419aba4
-
SSDEEP
3072:kv/Vt9a2bvbytdsdh1i2cdGSsxRG2S4RWsvbEafQHNLhwP6YN4nZ2X:vmvbIsdvKduXGgUEbpQtLORN4n0X
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a43c435aabcad33053f04e1ad2e8a5cf5304e0baf033accd200935abedc27f16.exe windows x86
e633665acb2adf7981d6da235864c75e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CloseHandle
CreateFileA
OutputDebugStringA
ExitProcess
WinExec
WriteFile
LoadLibraryA
GetSystemTime
SetFilePointer
CreateProcessA
HeapAlloc
lstrcmpiA
GetVersionExA
GetModuleHandleA
GetProcAddress
GetTickCount
lstrlenA
GetTempPathA
GetModuleFileNameA
LCMapStringA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
GetLastError
TerminateProcess
GetCurrentProcess
HeapFree
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
iphlpapi
GetAdaptersInfo
ws2_32
send
WSAStartup
gethostbyname
socket
htons
inet_addr
connect
recv
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE