Behavioral task
behavioral1
Sample
23a6737bb26f8e970591b7d4843e3b4a5e9b6cd92d87138ff8efe2ed488065dc.exe
Resource
win10-20220901-en
General
-
Target
23a6737bb26f8e970591b7d4843e3b4a5e9b6cd92d87138ff8efe2ed488065dc
-
Size
3.5MB
-
MD5
b9d012f7383a10a51e3d6b9dbec0ae9b
-
SHA1
dafcd1c3f721be08aeeefdf76e092924933b34b4
-
SHA256
23a6737bb26f8e970591b7d4843e3b4a5e9b6cd92d87138ff8efe2ed488065dc
-
SHA512
cb7707b913f43e08d87058644d3f4bceadbf7023bd0a1b40b8111b71b6ef575fcb586f0d6922569a39e935b1c1d5c3d84f3ad1de1687a434c7ab01d071e7609e
-
SSDEEP
98304:IA5gpDFqB9ivqRle0qmt1NFfyyahCSykNudv5EPxVUZy2b1:IsEqRb/tpyJhCSykNudv5EpVUZy2b1
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
23a6737bb26f8e970591b7d4843e3b4a5e9b6cd92d87138ff8efe2ed488065dc.exe windows x64
f4f3033dc6d082dab79624f81575aceb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapCreate
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
RegCloseKey
shell32
SHGetFolderPathW
winhttp
WinHttpQueryHeaders
crypt32
CryptUnprotectData
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 904KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ