Behavioral task
behavioral1
Sample
c5dee699704e6604008b656c105ad9c67aaf8bb0194d21758f6beebd5289d3ed.exe
Resource
win7-20221111-en
General
-
Target
c5dee699704e6604008b656c105ad9c67aaf8bb0194d21758f6beebd5289d3ed
-
Size
5.3MB
-
MD5
cc6dd6a0dfd43893cd9a2f34517d59ba
-
SHA1
bea6c2f1c98a3d0909ef58114fbf10fcd45522ad
-
SHA256
c5dee699704e6604008b656c105ad9c67aaf8bb0194d21758f6beebd5289d3ed
-
SHA512
c78c9f3e4c0f1947c3d6d232ada6c1d1499caf86fd159d6ca9358352ded39aed43b911347f36a0b1e3e26f39020dcd55223a6ad7b90a0e6e40816540ab76e14e
-
SSDEEP
98304:VAklHAYH/eBJyOr9nnyHBAzXdayM+aPbxX+Pr9Rm8qHrbiiL7WoqeGW7ORTHgSH+:VAklP/eiOr9nnyHBAzHHqX+Tzm157RqY
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
c5dee699704e6604008b656c105ad9c67aaf8bb0194d21758f6beebd5289d3ed.exe windows x86
e0e3a5e7d7c7d54bd180f539331ee00e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOpen
ws2_32
getpeername
rasapi32
RasHangUpA
kernel32
CompareStringA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CloseClipboard
gdi32
CreateDIBSection
msimg32
GradientFill
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
StgOpenStorageOnILockBytes
oleaut32
SysStringLen
comctl32
ImageList_Destroy
oledlg
ord8
wininet
InternetOpenA
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE