Behavioral task
behavioral1
Sample
f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe
Resource
win10v2004-20220901-en
General
-
Target
f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1
-
Size
96KB
-
MD5
160acdb0d86f849f9f47342ef3fe5f95
-
SHA1
c50c1e22b815ef0ba28b63fe70bfa06bd85c3e93
-
SHA256
f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1
-
SHA512
8fa729cf7f945d678e41b90928a294a2ec64b896039da6c2ebc232abcd28178c06dd9d4debe3deac9303ae5c85a0b067cc5679f7a6b2dcb9ca00d135b09a56a5
-
SSDEEP
1536:vTkzigHR3ShXPeT/YatdfI2lNYeT6JXOzVK9PAPGvP9Fk/a5NRdMe:A3YX0/XNjlNTT6dOGHP9Fk/avr1
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe windows x86
254e9a77e33c10f3f4817046d80c1c03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
lstrcmpiA
GetCurrentProcess
ExitProcess
WinExec
WriteFile
CreateFileA
lstrcpyA
GetModuleFileNameA
CreateThread
GetCurrentThreadId
GetProcAddress
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
ReadFile
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
FindResourceA
LoadResource
GetWindowsDirectoryA
lstrcatA
IsBadCodePtr
IsBadReadPtr
SetFilePointer
CloseHandle
FreeResource
GetStringTypeW
Sleep
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetLastError
FlushFileBuffers
VirtualProtect
user32
GetInputState
PostThreadMessageA
GetMessageA
PostMessageA
GetTopWindow
GetWindow
GetClassNameA
GetWindowTextA
ShowWindow
FindWindowExA
GetDesktopWindow
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
crypt32
CertAddCertificateContextToStore
CertCreateCertificateContext
CertOpenStore
CertOpenSystemStoreA
Sections
.text Size: - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 42.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ