Behavioral task
behavioral1
Sample
48bfde766f1cc95368dc541eb2a677f2cc21726e7e810316ef580ddfba0c477a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48bfde766f1cc95368dc541eb2a677f2cc21726e7e810316ef580ddfba0c477a.exe
Resource
win10v2004-20220901-en
General
-
Target
48bfde766f1cc95368dc541eb2a677f2cc21726e7e810316ef580ddfba0c477a
-
Size
256KB
-
MD5
7c8ce74dfbba216b4ac618ab9fa9c690
-
SHA1
f91637e7ac16d1a7f74d4d6e1ae1cf30df059762
-
SHA256
48bfde766f1cc95368dc541eb2a677f2cc21726e7e810316ef580ddfba0c477a
-
SHA512
ed4defa728180de300d8ae3d144442e19bf19c852cd18ba0a390abab2999b2d80a26b3c85844f762e4fca1527e0b8f0ba4837020c2c1ec421e70afd6fd7a5502
-
SSDEEP
6144:L2gesJ12TMUQ8pfFquGUA8uIe7nl4Y7DOg9omdKRm1:hKTMUNfFquDA8LI4Eig9h1
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
48bfde766f1cc95368dc541eb2a677f2cc21726e7e810316ef580ddfba0c477a.exe windows x86
9e494680556202cdfbd5a0c2e58d9146
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
ExitProcess
GetFileAttributesA
GetWindowsDirectoryA
GetVersionExA
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LocalAlloc
InterlockedExchange
RaiseException
GetLastError
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
Sections
.text Size: - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ