Behavioral task
behavioral1
Sample
8de91178477f94f4b888828ff9d8642f883f0d841630f8d9b4ddf4506ee273bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8de91178477f94f4b888828ff9d8642f883f0d841630f8d9b4ddf4506ee273bc.exe
Resource
win10v2004-20220812-en
General
-
Target
8de91178477f94f4b888828ff9d8642f883f0d841630f8d9b4ddf4506ee273bc
-
Size
50KB
-
MD5
5d0df1db1f0c91cc7e258a54e5ded98b
-
SHA1
74a7a93be7d9001ee1102141e91eccab84762e83
-
SHA256
8de91178477f94f4b888828ff9d8642f883f0d841630f8d9b4ddf4506ee273bc
-
SHA512
2e7a67affb64622951975f4d6219287bc333b4a7693e6a83c5d75d5c75bcd5d21b195422c549955e84f4426959609f37a70456d0cfcd65aa38089fc080dfb52a
-
SSDEEP
1536:LKMDi2CVG+V/69w6yehpOj7MxtHvSscTPt17nf:fDi2CVPWw6xgj7MxtHY7nf
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
8de91178477f94f4b888828ff9d8642f883f0d841630f8d9b4ddf4506ee273bc.exe windows x86
938fc5f079b0e0a5f8ea25f0d256bf87
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoFreeIrp
DbgPrint
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
NtQuerySystemInformation
ExAllocatePool
ExFreePool
hal
KeGetCurrentIrql
Sections
.text Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 318B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ