Behavioral task
behavioral1
Sample
0f7ba0e7bc1f544ed6f74e1e44c0ca7b13cd5c2e0eef3bd8fae71e6ac2cd478b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f7ba0e7bc1f544ed6f74e1e44c0ca7b13cd5c2e0eef3bd8fae71e6ac2cd478b.exe
Resource
win10v2004-20220812-en
General
-
Target
0f7ba0e7bc1f544ed6f74e1e44c0ca7b13cd5c2e0eef3bd8fae71e6ac2cd478b
-
Size
131KB
-
MD5
14ab8b9db8b9488334280ad93d45c3c0
-
SHA1
540f01527ee8144383793bdd23dd92ace7ef97f8
-
SHA256
0f7ba0e7bc1f544ed6f74e1e44c0ca7b13cd5c2e0eef3bd8fae71e6ac2cd478b
-
SHA512
0f9e9a7be32b473c76de64485b90f552c3c05e8fed0a32b8e609460662c31f2d01e991eaeff28df460b09fb208ee04c2071d80635d84017b4acab09461318dda
-
SSDEEP
1536:60sDvnGDRsl5yZt147fPARWORcjD085e7cUoYHY/O7+5jNkS52LdyzEKYJpZ/dmr:ItUCERcvwAYHY/O7+jcsZYJpFfzJAEGL
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
0f7ba0e7bc1f544ed6f74e1e44c0ca7b13cd5c2e0eef3bd8fae71e6ac2cd478b.exe windows x86
4c0a507f23040bf4e66403904d18c032
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
FindFirstFileW
FindClose
FindNextFileW
GetWindowsDirectoryW
WaitForSingleObject
GetModuleHandleW
GetTickCount
Sleep
CreateProcessA
GetModuleFileNameW
GetStartupInfoA
ReadFile
GetFileSize
DeleteFileA
CreateThread
GetProcAddress
LoadLibraryA
GetCurrentProcess
GetLastError
GetSystemInfo
GetModuleHandleA
GlobalAlloc
GlobalFree
GetTempFileNameA
CreateFileA
CloseHandle
GetVersionExA
CreateToolhelp32Snapshot
GetDiskFreeSpaceA
HeapReAlloc
Process32Next
GetCurrentDirectoryW
GetSystemDirectoryA
GetFileAttributesW
GetVolumeInformationA
OpenProcess
GetDriveTypeA
GetLogicalDrives
Process32First
GetDriveTypeW
GetComputerNameA
GetProcessHeap
HeapFree
HeapAlloc
GetTempPathA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetWindowRect
GetWindowDC
ReleaseDC
GetDesktopWindow
gdi32
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
SelectObject
advapi32
GetTokenInformation
OpenProcessToken
GetUserNameA
CreateWellKnownSid
CheckTokenMembership
DuplicateToken
shell32
SHGetFolderPathW
ord680
ole32
CreateStreamOnHGlobal
ntdll
_snwprintf
_wcsicmp
sprintf
memcpy
memset
wininet
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
iphlpapi
GetAdaptersInfo
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdiplusStartup
psapi
GetModuleFileNameExA
mpr
WNetCloseEnum
WNetOpenEnumW
WNetEnumResourceW
Sections
.text Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ