Behavioral task
behavioral1
Sample
ea92d269c61a53365455a468e5dd6f01bccc2979a33268dc41552dc46773261c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea92d269c61a53365455a468e5dd6f01bccc2979a33268dc41552dc46773261c.exe
Resource
win10v2004-20220901-en
General
-
Target
ea92d269c61a53365455a468e5dd6f01bccc2979a33268dc41552dc46773261c
-
Size
3.3MB
-
MD5
3d33b840b14c77994554604654f656e4
-
SHA1
694101b5227925d39c75a9d306cb5e973aaf2ab4
-
SHA256
ea92d269c61a53365455a468e5dd6f01bccc2979a33268dc41552dc46773261c
-
SHA512
d8f1abed7978d48f13468f678c72df211f572a197de49b6ec551b9dccfb767033b9372cc2cc2b148939f9832dbd59e8a8c6df891458bc1a0f7db398c7cec3a4b
-
SSDEEP
98304:/IAyriVOjVe2MyIVNOU+N46v9javKqQGoLhnTA:/wiJT7NOX4k+CfN0
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
ea92d269c61a53365455a468e5dd6f01bccc2979a33268dc41552dc46773261c.exe windows x86
2d97b6c8f8025e784590a0e3e93923ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
Sleep
CopyFileA
GlobalAlloc
lstrcpyA
GlobalLock
ExitProcess
GetConsoleWindow
GlobalUnlock
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
ShowWindow
GetClipboardData
GetProcessWindowStation
GetUserObjectInformationW
shell32
ShellExecuteA
msvcp140
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
memchr
__CxxFrameHandler3
__std_exception_destroy
__std_exception_copy
_CxxThrowException
memmove
_except_handler4_common
memset
__current_exception
__current_exception_context
memcpy
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
_set_new_mode
api-ms-win-crt-filesystem-l1-1-0
_mkdir
_stat64i32
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
_getcwd
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_controlfp_s
terminate
_register_thread_local_exe_atexit_callback
_c_exit
_exit
_cexit
__p___argv
__p___argc
_initialize_onexit_table
_register_onexit_function
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_set_app_type
_seh_filter_exe
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 193KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ