Behavioral task
behavioral1
Sample
7b5db9e184489de4de40346c976e388871d3e5b7bb694b7f79d2e24c187c6ce5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b5db9e184489de4de40346c976e388871d3e5b7bb694b7f79d2e24c187c6ce5.dll
Resource
win10v2004-20220812-en
General
-
Target
7b5db9e184489de4de40346c976e388871d3e5b7bb694b7f79d2e24c187c6ce5
-
Size
156KB
-
MD5
817d17c29c2c19ebe89a9e3211736d2f
-
SHA1
3c5051d9f9270de5d50ce36f20107cc016f5102a
-
SHA256
7b5db9e184489de4de40346c976e388871d3e5b7bb694b7f79d2e24c187c6ce5
-
SHA512
1ec7a93a6415f068737fd44b697df299adf01f9e9d1fa9d91a85e5f9d9a18c47ea9de08c4c91d387745136220f88fe24a177bb5355adf4c643667483af68deee
-
SSDEEP
3072:2V+NUTCnJJpm7sohK4VXA5hi3iZmjPLEhWmwQAsiTCiNP5:2VIUuzY7bhVX43ZmjPLEhWmwKiTCcP
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
7b5db9e184489de4de40346c976e388871d3e5b7bb694b7f79d2e24c187c6ce5.dll windows x86
2744aa2441be1e0eab75dcd8287cb98d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDC
gdi32
Rectangle
advapi32
RegOpenKeyA
Sections
.text Size: - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ