Behavioral task
behavioral1
Sample
f20f92c60039c1482e56c353b0d6de0d014209c4ee01186a99ea2488e289cd42.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f20f92c60039c1482e56c353b0d6de0d014209c4ee01186a99ea2488e289cd42.dll
Resource
win10v2004-20220812-en
General
-
Target
f20f92c60039c1482e56c353b0d6de0d014209c4ee01186a99ea2488e289cd42
-
Size
112KB
-
MD5
47b2e370f2b016fa7397978c3fc3e1c4
-
SHA1
7b44540cab77cd17e8ff734335cfccda9f00c5da
-
SHA256
f20f92c60039c1482e56c353b0d6de0d014209c4ee01186a99ea2488e289cd42
-
SHA512
6ed68fef33a30d63aaa887b399cb153ad5e277ad3b6bd896f1a0c0a730b9298013c24d55a6bda21c90abd1bbc4409304c7f333352f6e9b1a7e0b4ca43fc21d54
-
SSDEEP
1536:RlU94pF12gTRpfcQAeEvVvLRnsWoEJstJVH0JI+GgdkzdnsNHA4h2spqJdUe4sWZ:LbQiERsWoEJsbB0S+xdkCNg4kPXZu
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
f20f92c60039c1482e56c353b0d6de0d014209c4ee01186a99ea2488e289cd42.dll windows x86
b2a595fc818da04324bac8cba56f3a8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
VirtualQuery
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetLocalTime
SetLastError
VirtualProtect
FlushInstructionCache
GetCurrentProcess
GetModuleHandleA
GetCommandLineA
GetVersion
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
CloseHandle
InitializeCriticalSection
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapAlloc
SetFilePointer
InterlockedDecrement
InterlockedIncrement
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
ReadFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ