Behavioral task
behavioral1
Sample
c1e2b01afce19af0e5623d48fd8129fb623269f66fa500bdb59e91743303bfad.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1e2b01afce19af0e5623d48fd8129fb623269f66fa500bdb59e91743303bfad.dll
Resource
win10v2004-20220812-en
General
-
Target
c1e2b01afce19af0e5623d48fd8129fb623269f66fa500bdb59e91743303bfad
-
Size
47KB
-
MD5
1c50029334427022d2795f215450ead1
-
SHA1
6a73230e78ee4ce3e4810f30578a8b9010465894
-
SHA256
c1e2b01afce19af0e5623d48fd8129fb623269f66fa500bdb59e91743303bfad
-
SHA512
b0d35570cea1936003486e12853891d7c908d2a803d222c8349beb813433ef0f07d1f4f7010c375970ecae83bcd8cf992b0837c4fbf0278b877b0df4df98e31d
-
SSDEEP
768:AlCEcACR2DMByYgv9v7utgUALI7beFetxXVBprBBQARQkZGeMHc/2tv0rMKjD5bv:AlChVR2oN5/XVBprBBQAR+A2tWjtpvZ0
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
c1e2b01afce19af0e5623d48fd8129fb623269f66fa500bdb59e91743303bfad.dll windows x86
812f95da20b6b3fee0041b4928c24650
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memcmp
memcpy
strlen
strstr
_snprintf
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
kernel32
lstrcmpA
GetTempFileNameA
GetStartupInfoA
GetLastError
GetFileSize
GetExitCodeThread
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
CloseHandle
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpynA
lstrlenA
IsBadReadPtr
DeleteFileA
lstrcpyA
CreateFileMappingA
CreateFileA
MapViewOfFile
MoveFileExA
ReadFile
GetTempPathA
user32
SetTimer
MapVirtualKeyA
GetKeyboardState
KillTimer
wsprintfA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
RegisterWindowMessageA
SendMessageA
ToAscii
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1024B - Virtual size: 734B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ