Behavioral task
behavioral1
Sample
a8756585ef0e2e4e7479606e49a56e52c871c24b65c356b6b38f29cbae300ecc.exe
Resource
win10-20220812-en
General
-
Target
a8756585ef0e2e4e7479606e49a56e52c871c24b65c356b6b38f29cbae300ecc
-
Size
3.5MB
-
MD5
d4381f0a771033752684747eb4d55fc7
-
SHA1
5a87be21de6aa7275ec3b076dfcd72469b129dd7
-
SHA256
a8756585ef0e2e4e7479606e49a56e52c871c24b65c356b6b38f29cbae300ecc
-
SHA512
9869d894bd243b5e8d957190920c6764a5fa837d34bb5c7a1ae6e8b6bd8a194e056da9e9d38d516edff17b4a3b9707f77f2a0766cf8f00de50b142abae35bf10
-
SSDEEP
98304:wpNo2IecaP2hSdky9lqZ8GaNFvf4cISKJ3UIDslW+5zs4L:R2uT8hbqeTISKJ34/
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a8756585ef0e2e4e7479606e49a56e52c871c24b65c356b6b38f29cbae300ecc.exe windows x64
f4f3033dc6d082dab79624f81575aceb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapCreate
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
RegCloseKey
shell32
SHGetFolderPathW
winhttp
WinHttpQueryHeaders
crypt32
CryptUnprotectData
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 897KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ