Behavioral task
behavioral1
Sample
8da1331fcb4d9db9b04250c22e60cf9537f004ae2956b33b43491e020211604e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8da1331fcb4d9db9b04250c22e60cf9537f004ae2956b33b43491e020211604e.dll
Resource
win10v2004-20220812-en
General
-
Target
8da1331fcb4d9db9b04250c22e60cf9537f004ae2956b33b43491e020211604e
-
Size
96KB
-
MD5
0ee6626cf84391e7d20dbb742282e2c1
-
SHA1
b85c18d958dbb9819c3e918b1b8676b5484ee2f8
-
SHA256
8da1331fcb4d9db9b04250c22e60cf9537f004ae2956b33b43491e020211604e
-
SHA512
6f9c5484560e73ee29d10a1114223b5201cc008e2b12ba046e6f229d93de04e3839f26df9afc03755fe31e961f7b5e5ea9a0c9dda292bc351585cd46c41780d8
-
SSDEEP
1536:Lu0s+S3laAGcvKen/gFnToIfITRqr5ZzNT3Fp0zA+V/R8UM:60s+Sien/gtTBfITRqr5ZzNT3P0Z9
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
8da1331fcb4d9db9b04250c22e60cf9537f004ae2956b33b43491e020211604e.dll windows x86
7a54b84dcb4b8a76b96885a7f6d32f0b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
WinExec
MoveFileExA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
GetModuleFileNameA
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
CreateThread
WaitForSingleObject
lstrcpyA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
lstrlenA
SetLastError
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
LoadLibraryA
Sleep
GetProcAddress
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
user32
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
ExitWindowsEx
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
GetDesktopWindow
wsprintfA
keybd_event
OpenDesktopA
gdi32
CreateCompatibleBitmap
GetDIBits
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
BitBlt
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
wcstombs
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
_strlwr
_ftol
strstr
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
__CxxFrameHandler
strncat
sprintf
strncpy
??2@YAPAXI@Z
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
ws2_32
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
setsockopt
WSAIoctl
send
shlwapi
StrStrIA
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE