Behavioral task
behavioral1
Sample
669012412c852f434f885fb87b09d0988a41d8891cdc01ba9f9cbcd545771b12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
669012412c852f434f885fb87b09d0988a41d8891cdc01ba9f9cbcd545771b12.exe
Resource
win10v2004-20220901-en
General
-
Target
669012412c852f434f885fb87b09d0988a41d8891cdc01ba9f9cbcd545771b12
-
Size
53KB
-
MD5
0e68c27462896d58a9e7c444c3a8f898
-
SHA1
87ef8b24f6d70d2af3eb83babdb17472eb7c2379
-
SHA256
669012412c852f434f885fb87b09d0988a41d8891cdc01ba9f9cbcd545771b12
-
SHA512
4099d5b05a5fdcdd5b8ce425661f07401bd4101dacf565ffc012cea80920ac90a4cb2688de9114ceed13f718599dc8b12728e217ba2a626b48d401798bbf9f20
-
SSDEEP
1536:Fc9PicFSxEj+KZtW40ny+t6fgGcaiUJcZXyVLVF:Fc96cTlfWB0DcOayVLV
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
669012412c852f434f885fb87b09d0988a41d8891cdc01ba9f9cbcd545771b12.exe windows x86
d6987e46c778d4a03e3d99d452070b10
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
DeleteFileA
ReleaseMutex
OpenMutexA
InterlockedExchange
CreateThread
WaitForSingleObject
GetLastError
CreateMutexA
SetPriorityClass
GetModuleFileNameA
GetStartupInfoA
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
CreateProcessA
CopyFileA
lstrcmpiA
GetModuleHandleA
SetErrorMode
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
ReadFile
GetFileSize
SetFilePointer
CreateFileA
GetCurrentProcess
CloseHandle
lstrcpyA
GetVersionExA
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
GetWindowsDirectoryA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
GetCurrentProcessId
OutputDebugStringA
Sleep
SetFileAttributesA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfA
ExitWindowsEx
MessageBoxA
advapi32
DeleteService
RegOpenKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreateServiceA
StartServiceCtrlDispatcherA
StartServiceA
shell32
ShellExecuteA
msvcrt
_controlfp
_except_handler3
__set_app_type
rand
srand
sprintf
strncpy
strcspn
strstr
??2@YAPAXI@Z
atoi
memmove
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
ws2_32
WSAStartup
closesocket
socket
send
connect
WSASocketA
shutdown
recv
__WSAFDIsSet
select
setsockopt
htons
htonl
inet_addr
sendto
gethostbyname
WSAIoctl
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
shlwapi
SHDeleteKeyA
Sections
.text Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lst Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp0 Size: - Virtual size: 20B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ