Behavioral task
behavioral1
Sample
ee4b55ec777d14b3b95453b3617fa79518288da63cd6e009c8c18110ae87b01e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee4b55ec777d14b3b95453b3617fa79518288da63cd6e009c8c18110ae87b01e.exe
Resource
win10v2004-20220812-en
General
-
Target
ee4b55ec777d14b3b95453b3617fa79518288da63cd6e009c8c18110ae87b01e
-
Size
64KB
-
MD5
175f663cf55bf504a3a1e5ae05341e00
-
SHA1
dd35cb37a7866c5b24d465420875688c1473de7e
-
SHA256
ee4b55ec777d14b3b95453b3617fa79518288da63cd6e009c8c18110ae87b01e
-
SHA512
9fc3083cbeb305d0c273b0c7d5e81e5f31738ef2951d86368112e625d7ca3d7f46da18520a2bc72994c2d3d5739bc5f5be324f5cdeb189cf8f7c32d5c09f747f
-
SSDEEP
1536:hZuQpzKNzeQJHXIhVJGYygL4N4hh4y06+F8S:e+QJHXId5yk4e038
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
ee4b55ec777d14b3b95453b3617fa79518288da63cd6e009c8c18110ae87b01e.exe windows x86
634a30da86978433ecd692bb74afc2dc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
ZwReadFile
ExGetPreviousMode
DbgBreakPointWithStatus
ZwSetValueKey
ZwSaveKey
KeDelayExecutionThread
ZwCreateFile
PsCreateSystemThread
DbgBreakPoint
ZwQueryValueKey
ZwQueryDirectoryFile
ZwQueryInformationProcess
ZwCreateSection
ZwQueryInformationFile
ZwDeleteKey
DbgPrint
ZwEnumerateKey
ExFreePoolWithTag
_wcsnicmp
ZwWriteFile
ObQueryNameString
IoGetCurrentProcess
MmMapViewOfSection
ObReferenceObjectByHandle
KeAttachProcess
ZwOpenProcess
KeServiceDescriptorTable
PsGetCurrentProcessId
MmIsAddressValid
ObfDereferenceObject
MmSectionObjectType
ZwOpenKey
NtWriteFile
MmUnmapViewOfSection
NtSetInformationFile
NtQueryInformationFile
ZwSetInformationFile
NtClose
RtlCompareUnicodeString
NtReadFile
ZwClose
IoCreateFile
KeDetachProcess
RtlInitUnicodeString
_except_handler3
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ