Behavioral task
behavioral1
Sample
831d2431921fa5daa16f75b44b09072e840865efe70c5d3df931bc537252ffca.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
831d2431921fa5daa16f75b44b09072e840865efe70c5d3df931bc537252ffca.dll
Resource
win10v2004-20220812-en
General
-
Target
831d2431921fa5daa16f75b44b09072e840865efe70c5d3df931bc537252ffca
-
Size
172KB
-
MD5
218fd77118982678343f0596951ab570
-
SHA1
67f25803f4acdcab5e99d5999933444895614ee2
-
SHA256
831d2431921fa5daa16f75b44b09072e840865efe70c5d3df931bc537252ffca
-
SHA512
34ec59a19c5304491eca7172bca52fd0cd3e809bc46389b4cc16afcc5f35c397a726fb69499194e7860a2dcfa009688c2214e11e23b574123b34248b67ee9b0f
-
SSDEEP
3072:Y8bdsjsWojpJPgxE8Tm+n5e4aPs5708q9WZzYyO/3CaY7QiV30b6HCM:Y8bxPJPwEEmakUDCWZkjfxYcb6
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
831d2431921fa5daa16f75b44b09072e840865efe70c5d3df931bc537252ffca.dll windows x86
69a0403dfd63cbe672c661da5794ebb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
WriteProcessMemory
Sleep
GetProcAddress
VirtualProtect
VirtualQuery
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentProcessId
OpenProcess
LoadLibraryA
OutputDebugStringA
IsProcessorFeaturePresent
GetCurrentProcess
FlushInstructionCache
SetLastError
TerminateProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
ScreenToClient
GetForegroundWindow
GetCursorPos
MessageBoxA
GetAsyncKeyState
wininet
InternetOpenUrlA
urlmon
URLDownloadToFileA
msvcrt
_ftol
sqrt
sprintf
atan
pow
atan2
abs
strlen
strstr
cos
memcpy
??2@YAPAXI@Z
memset
strcat
_vsnprintf
strchr
strncpy
??3@YAXPAX@Z
_CIacos
_finite
__CxxFrameHandler
_EH_prolog
free
_initterm
malloc
_adjust_fdiv
sin
strcpy
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 22.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ