Behavioral task
behavioral1
Sample
7d9a148cb89e422064753fa5691bd5de90b5a5897529323dd90bfb662a42ed75.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d9a148cb89e422064753fa5691bd5de90b5a5897529323dd90bfb662a42ed75.exe
Resource
win10v2004-20220812-en
General
-
Target
7d9a148cb89e422064753fa5691bd5de90b5a5897529323dd90bfb662a42ed75
-
Size
768KB
-
MD5
9125f375a29bb92ee4d33f0f166cf8a8
-
SHA1
14b88feb01f02b1da0635be7a2aaa56ab052814e
-
SHA256
7d9a148cb89e422064753fa5691bd5de90b5a5897529323dd90bfb662a42ed75
-
SHA512
983d2476ebf74944a6c621ddfdbc5acc6fdb11d6e85ea0ba127d54121bc012578b01918ab298b1e6ac1b1d1b2de18a877869e51ee20e5676c2e4c9dbd0103e3d
-
SSDEEP
12288:5LoHhV6gzx7AijnO/zniRDzpinio20X2Fvq9nmGHMVcTYedUJegROJzkgTjAcJXt:5ULbOTRnca2d7GHMGH8egMQgTk9uB+0Z
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
7d9a148cb89e422064753fa5691bd5de90b5a5897529323dd90bfb662a42ed75.exe windows x86
d1c4f968d79d8b78345c7603cbef07cf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeTickCount
KeQueryTimeIncrement
KeWaitForSingleObject
_allmul
ZwClose
IoGetCurrentProcess
ObfDereferenceObject
PsGetVersion
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlAppendUnicodeToString
memcpy
wcslen
ExFreePoolWithTag
IoDeleteSymbolicLink
RtlFreeUnicodeString
KeSetEvent
RtlAnsiStringToUnicodeString
RtlInitAnsiString
_except_handler3
IofCompleteRequest
RtlAssert
ExAllocatePool
ZwQuerySystemInformation
RtlCompareString
strncpy
strlen
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ExAllocatePoolWithTag
strcpy
ZwReadFile
ZwQueryInformationFile
KefAcquireSpinLockAtDpcLevel
KefReleaseSpinLockFromDpcLevel
KeInitializeEvent
PsCreateSystemThread
RtlAppendUnicodeStringToString
memset
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KfLowerIrql
KfRaiseIrql
KfAcquireSpinLock
KfReleaseSpinLock
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 974B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 752KB - Virtual size: 752KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ