Behavioral task
behavioral1
Sample
5f3a8fb712dbdf218be6e8f27793d38fc478c3ab1093611ee2e2fb83e77f071f.dll
Resource
win7-20220901-en
General
-
Target
5f3a8fb712dbdf218be6e8f27793d38fc478c3ab1093611ee2e2fb83e77f071f
-
Size
592KB
-
MD5
440dbfa1e015df5e19fbe780dbd15dc1
-
SHA1
96e7a86082ae7689cb162c62fd15df75cc608871
-
SHA256
5f3a8fb712dbdf218be6e8f27793d38fc478c3ab1093611ee2e2fb83e77f071f
-
SHA512
a49ca3e4f593cd509755de7e47ec75efca11f23800c36342a20d32e210ec964c6368edd76cf25d7d5ae22ae24f3c9194c6fefca6aef4ab74671f955409883ec5
-
SSDEEP
12288:MgUYcOj5s7qoYnw3uXa5tTuUFupP6+Zp4zz:MmVoqeuXa5txGPPOz
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
5f3a8fb712dbdf218be6e8f27793d38fc478c3ab1093611ee2e2fb83e77f071f.dll windows x86
dfbe255f972123265c2e14d28192cbde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
WritePrivateProfileStringA
MulDiv
GetProcAddress
DisableThreadLibraryCalls
CreateThread
GetModuleHandleA
Sleep
Beep
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
GetSystemInfo
OutputDebugStringA
LoadLibraryA
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetSystemMetrics
GetAsyncKeyState
DestroyWindow
ShowWindow
CreateWindowExA
MessageBoxA
ScreenToClient
GetForegroundWindow
GetCursorPos
gdi32
CreateCompatibleDC
CreateDIBSection
SetMapMode
DeleteDC
DeleteObject
ExtTextOutA
GetTextExtentPoint32A
SetTextAlign
SetBkColor
SetTextColor
SelectObject
CreateFontA
GetDeviceCaps
msvcr90
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
_malloc_crt
_encode_pointer
strncpy
clock
sprintf
__CxxFrameHandler3
_time64
_localtime64
strchr
ceil
malloc
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
memmove
memcpy
free
tmpfile
fclose
fwrite
fseek
fread
_CIpow
_ftol
longjmp
_setjmp3
isdigit
isspace
sscanf
ldexp
_strdup
setlocale
floor
_CIacos
_finite
__CxxFrameHandler
exit
d3d9
Direct3DCreate9
winmm
sndPlaySoundA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
Sections
.text Size: 261KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp3 Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 686B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ