Behavioral task
behavioral1
Sample
cf68e53f4d1fa1ecf8204cd684e841cc3b4110d8e468da6d2342eedac5980797.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf68e53f4d1fa1ecf8204cd684e841cc3b4110d8e468da6d2342eedac5980797.exe
Resource
win10v2004-20220901-en
General
-
Target
cf68e53f4d1fa1ecf8204cd684e841cc3b4110d8e468da6d2342eedac5980797
-
Size
1.9MB
-
MD5
62d92c71ac06a93f15e0c0645d55793d
-
SHA1
212aacc94656b5a19b611383e728203fb670f42e
-
SHA256
cf68e53f4d1fa1ecf8204cd684e841cc3b4110d8e468da6d2342eedac5980797
-
SHA512
d4274aaf5f45b409ee959f1d717a3da268b6a45ecf41a89ebea7d2077937b91df925611f5728c3998991b4161c895ee50eb953384e5594435cbed053359bedfc
-
SSDEEP
49152:SWBziI/txc6WmF7RBVZlPFNze/FMscRt:SUP/chmF799Y/uscn
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
cf68e53f4d1fa1ecf8204cd684e841cc3b4110d8e468da6d2342eedac5980797.exe windows x86
8178de4f9b3b80aa8574d9fc16382d7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasGetConnectStatusA
kernel32
MulDiv
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowsHookExA
gdi32
Escape
winmm
midiStreamRestart
msimg32
GradientFill
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
OleUninitialize
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Duplicate
ws2_32
WSAAsyncSelect
wininet
HttpQueryInfoA
comdlg32
GetOpenFileNameA
Sections
.text Size: - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE