ServiceMain
Behavioral task
behavioral1
Sample
6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe
Resource
win10v2004-20220812-en
General
-
Target
6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a
-
Size
122KB
-
MD5
de3abc441c3093de4c2a54b0e9cf828e
-
SHA1
260247cb09238b20188b04f71f7a0058cb9c45e6
-
SHA256
6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a
-
SHA512
e091b7b03b3ad94039b99c1eed65b4f3ec9ca2c2ed8bbc870622aea1a91252ca6bdfb15f8143772d46d236ca3c7f78ddd8a6608403764bc6f40ad1d3bd0791d1
-
SSDEEP
3072:tnDHH47khTSHz4dwqKdM6i4JGpZh37uLjudqz9d0k2:tDn440zt46i4EruLork2
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe windows x86
80c2a7bb330a1d345e5a0aa80091a6cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strchr
memset
strcspn
atoi
strstr
memcpy
strtoul
strncpy
srand
rand
kernel32
LoadLibraryA
CloseHandle
WriteFile
lstrlenA
CreateFileA
lstrcatA
GetTickCount
GetTempPathA
GetModuleFileNameA
GetProcAddress
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
LocalFree
LocalAlloc
CreateProcessA
SetErrorMode
CreateThread
WaitForSingleObject
InterlockedExchange
CopyFileA
TerminateProcess
DisconnectNamedPipe
ReadFile
ExitProcess
CreateNamedPipeA
SetFilePointer
GetWindowsDirectoryA
DeleteFileA
Sleep
ConnectNamedPipe
VirtualProtect
ExitProcess
user32
wsprintfA
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CreateServiceA
StartServiceA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoInitializeEx
ws2_32
setsockopt
WSAGetLastError
WSASocketA
recv
connect
gethostbyname
inet_addr
WSAIoctl
WSAStartup
send
socket
closesocket
htons
sendto
htonl
Exports
Exports
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 984B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ