���d���B�>�$�G\�u ��� f�ael����>0���T>�ڦ[���s��C{�L�砶4���tv7�����td������i��>EeE;싪�<p��������_��� s��JGS@H-���;�ޚ\�RF1�'�L��ה��!�����Vh��)��n���m�,UY"@7\[�Vu#p�z�����o�Ql��R��۫(E�ehDRc^����\a� QU8�2��'K+�;%�;cin�lCQL�� �Z�t�}��{Tz�ԛ;�Sy#��O��3����3 �z��p� �b"���I8V�B�Ͽ��<����bT��vs�=S|ᤦ�0;L�5i�X�\b#.5�ՌS���t��'�_~�N�� 9p���2�{��q��HO��d���j撬E��L�� �,<�����=�S�͙���:�ͮB𩠼I'�Iß? ��(P6+���m��@�)<͡�Z^v���PB�z<ص.H��4-��[���3�#�O�7�\Y��l��W��brp�Y>��9��*)��y�H&�j9�+<�E���Veh�T��m܌�<Wǡ`�^خ��ރ��D�Ù_0�{�D,S3l"p��pϵ�Q�X�` l�q�#E2h�|x��x��_�%3sPmK�PIt���S+��r���ㅥ���d?<���L,��`k��r`&���m���ࡣsu�t �A��k ��nL;IB; 9���5�����;���IF;�v%X���-TJ��6���&ك�HX�yat�r{Y�/�6o�/#2Č�,� �!}�;Z��E�%��܇P� �(F��w�W�ɏ��������W�Z�X���8�ڡ�H�#��I� ��m��60���;P ���h�\#��@N�D(T�3W���JΉ�c�x��N���,�Y`�|C9��y�K�����f���A�P0��"GL��Ǚ����?Х�4�B�Գ�7䷆�� %%C��j�3�(4*c����� �2�B��F�W��q̂R}�����z�pX�by:rF+ŵ�$t���p���{T�\?�v-q�2�<��,@�J����Pwi���{9�o X��"D�C@\�+�\��SKκ�ZU �Y��h�R�3���D�v@�g*�q�qO��5=��� k]��q��:,�dPE�c�Fq��g.����{�ۆm�����V&�ta� �Msۋ�R�� ��'+�d*J� %��x��e��3&�A��M�k�]�K�� �y���')�'�Ot����n�<ޠLm���d��O0s,���u�����̢�ް�������렧M��;�)-y �X�\D��?^#��c�2x�4AR?��]f\�%EAY���D�i��Li][a��FkȞ�|�����B$X�����\q���F��S�� ��!ta�4�� �ډ)3�`s�b�����s�'~;Ӫ�ˈ!����>��>�8 D�x�*�F���N<� ݧ1P]��nZ���..S���dc͐����ؔ��g�QZp�1���+Z�qf�j��ebf ���$d�|i(�m$�{>��R�A����f9#��t�4hA�zW�p�mO<.��#}"F���d��pM&�7Щ-x��z˺>=��J�/�����H��Fap�i�a��gK[ۢ���)��7�gZ()-����!��N��ŸB��O6��ē �-���(�����F��Ho\*���n�ҹ���xu���w~5�A!'�-L�>0.�j��\�l5�3�[ʹ�7c6�;�|1�{i�CsD���Y�� ����5�����|�F ��ϒ��S��L�T"�y�˲�LG;o�e��u���e:���a>P|�0r��D�!^���EP���k?�����j�(o )�����V��8F��?y�2��� ���~N�F�@�U�}0;�_p��{6�{�x�Ԇ~Y�d%*�������G��T��@��c��O��u&�<ɔ�ΌRc}�e+��Vϓ� -,�X��m�A��;�Վ�4\��v��Sy>��>�B��_/>6� ҧؓ�G��� 7]�[C�Y�F�R!��ુ�5�cF��1�R\�Ga�0R�˟���>�7��H��/'`^Wr�-(��n����������K� A�%��jR�Ρ�$>��wk�8����=˙| ɠe�pv��\D*�&��{�����Qu��hA�밚**�����c� &'�ov�S*iH�@�Nc\vfӏ"�}�m.�Ң[�3Y ��:|���F���GSB˵�NU��-�H�n�����I*��Nb���^����?A�!L��Xb\��{T�h��ae�2^�-CN�A Y�b錭u �p����ʖ��a��'����N�ҊԽ��{���8OBm�c����v���_�,�2 1ढ़&?�R�J� �q�++W)����+�G�Y{� s�K�ʗ��a9UNȥ�>rF��ac��ab���j6W�"��9���P�owՎGΟ2��597�c���$$-[�9k��;Լ��b��l�!�;g�|w��v�5*����&z���7o��]�7L[�Eהt��1#A�}י����1��S����"��<+p��sC�A���2� !������E��L����Y��9�T�������1=s-�x�PS��Ŵ'�Z��f9؇,⻡- ��������b=S���ɱq�{$�F)RR�I�xcc�)RN��v8���*Ru�l`;�������H���U`�~�H�N����t ��>n�L�^id����������S,T9�P�:�X�� 6DF;G���L��1�T��N��k��9���N�Wn��E�p��;������:�c���y�h�?�4q}�(�1Ƈva�>S-�&�T�u�I0�g�!_�t5��pZ �$e�w�Ԍ| ��bS]�= a4i)ȳ�9����4ki~� ������擔vSQ8"�ǧ���q������j�1�JH��0M��2�|n$'[�hʏҿ-=��>�� ���hQ㌺�\'O�]S�~�P�߽�N��)��cd���ۑ���Dž�m�z-oOi����L ��y�̨ �� [ �c����^��������`�8xUr���u�$wv�Sǝr��n��&
Behavioral task
behavioral1
Sample
67dc10db52ab34bf38b64808047591a68b5f16e024d671c9966e8c2638579213.exe
Resource
win7-20220812-en
General
-
Target
67dc10db52ab34bf38b64808047591a68b5f16e024d671c9966e8c2638579213
-
Size
2.3MB
-
MD5
3215fd1e5b4ae6af0c59100f2cbc7b4f
-
SHA1
4bda0141b30c2d95b18c2419ad2e5981c3ec3b7c
-
SHA256
67dc10db52ab34bf38b64808047591a68b5f16e024d671c9966e8c2638579213
-
SHA512
5afc8f3269d66e50101fd9be7a588904001354bb8455d920e6f26161d54c06eb2e6738c6cf7be67d613d2046601da440c271a3f8915cc5c8fdc077253af15f7d
-
SSDEEP
49152:cKXUKtP70iyN+uuyrHdztYV/847XW/FPNCj8hy:cKXxFXy3tanj3w
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
67dc10db52ab34bf38b64808047591a68b5f16e024d671c9966e8c2638579213.exe windows x86
0e25b0e0c6b4b302e21f0850de502be4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
ws2_32
accept
htons
WSAAsyncSelect
closesocket
send
getpeername
inet_addr
inet_ntoa
gethostbyname
WSAStartup
WSACleanup
select
recv
connect
ioctlsocket
recvfrom
setsockopt
socket
version
GetFileVersionInfoSizeA
VerQueryValueA
VerLanguageNameA
GetFileVersionInfoA
rasapi32
RasGetConnectStatusA
RasHangUpA
kernel32
GetVersion
TerminateThread
WideCharToMultiByte
FileTimeToSystemTime
SetNamedPipeHandleState
WaitNamedPipeA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
OpenEventA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
InterlockedIncrement
InterlockedDecrement
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
InterlockedExchange
GetLocaleInfoW
IsBadCodePtr
IsBadReadPtr
CompareStringW
CompareStringA
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
SetEnvironmentVariableW
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
GetACP
HeapSize
RaiseException
GetLocalTime
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
LocalReAlloc
GlobalHandle
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
GetThreadLocale
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FormatMessageA
LocalFree
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WaitForSingleObject
CloseHandle
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
lstrlenW
lstrlenA
LoadLibraryA
FreeLibrary
GetFullPathNameA
GetUserDefaultLCID
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
GetDriveTypeA
FindNextFileA
lstrcpyA
WinExec
GetLocaleInfoA
GetTimeZoneInformation
SetLastError
MultiByteToWideChar
GetSystemDirectoryA
GetWindowsDirectoryA
TerminateProcess
GetCurrentProcess
GetFileSize
SetFilePointer
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
wsprintfA
IntersectRect
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
UnregisterHotKey
RegisterHotKey
CreateWindowExA
CallWindowProcA
SetWindowTextA
GetForegroundWindow
GetWindowTextA
FindWindowExA
GetDlgItem
GetClassNameA
GetDesktopWindow
SystemParametersInfoA
TranslateMessage
LoadIconA
DrawFrameControl
EmptyClipboard
PostThreadMessageA
GetNextDlgGroupItem
GetSysColorBrush
DrawEdge
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
LoadStringA
MapDialogRect
SetWindowContextHelpId
CharNextA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
MoveWindow
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
GetScrollPos
RegisterClassA
GetMenuItemCount
GetMenuItemID
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
DefWindowProcA
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
InflateRect
SetRect
UnregisterClassA
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
InvertRect
IsRectEmpty
ScrollDC
ReleaseDC
IsChild
TrackPopupMenu
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBeep
MessageBoxA
GetCursorPos
GetSystemMetrics
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
GetPropA
UnhookWindowsHookEx
gdi32
RectVisible
PtVisible
GetViewportExtEx
SaveDC
RestoreDC
SetBkMode
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
GetMapMode
SetPolyFillMode
SetROP2
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
MoveToEx
LineTo
ExtSelectClipRgn
GetTextColor
TranslateCharsetInfo
CreateFontA
SetBkColor
CreateRectRgnIndirect
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBrushIndirect
CreateHatchBrush
CreateBitmap
CreatePatternBrush
SelectObject
CreatePen
PatBlt
FillRgn
CreateRectRgn
CombineRgn
CreateSolidBrush
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
SetPixelV
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
Pie
Chord
Arc
Polygon
GetTextExtentPoint32A
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
RegCreateKeyExA
RegEnumValueA
shell32
DragFinish
DragAcceptFiles
DragQueryFileA
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
ole32
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
OleRun
CoCreateInstance
CLSIDFromString
OleUninitialize
OleInitialize
oleaut32
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElement
VariantCopyInd
SafeArrayGetUBound
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VariantClear
VariantCopy
VariantInit
OleCreateFontIndirect
UnRegisterTypeLi
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
SysFreeString
SafeArrayGetElemsize
SysAllocStringByteLen
comctl32
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_Duplicate
ImageList_Read
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
oledlg
ord8
wsock32
ntohs
getservbyname
shutdown
WSAGetLastError
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
InternetReadFile
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
ChooseFontA
Exports
Exports
Sections
.text Size: 928KB - Virtual size: 927KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 768KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ