ServiceMain
Behavioral task
behavioral1
Sample
e0f72c2311c065288f47277e1961a09616f36a6daeb2256444c8dd3a2c8742ef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0f72c2311c065288f47277e1961a09616f36a6daeb2256444c8dd3a2c8742ef.exe
Resource
win10v2004-20220901-en
General
-
Target
e0f72c2311c065288f47277e1961a09616f36a6daeb2256444c8dd3a2c8742ef
-
Size
122KB
-
MD5
2ffb189d0cbd907b95ca1f5a202a5f41
-
SHA1
0b1e4239ab33878ca6aafaed4787ad22142907b7
-
SHA256
e0f72c2311c065288f47277e1961a09616f36a6daeb2256444c8dd3a2c8742ef
-
SHA512
4bd5f13c39bf486235250267b0e2bb196e312e7b1ddc1a96fae0f3b7296cb5eb714e207053948ada2ea31bd7aa268df590181364b7dcb6a3b884330a28ee862b
-
SSDEEP
3072:gnDHH47khTSHz4dwqKdM6i4JGpZh37uLjudqz9d0ks:gDn440zt46i4EruLorks
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
e0f72c2311c065288f47277e1961a09616f36a6daeb2256444c8dd3a2c8742ef.exe windows x86
80c2a7bb330a1d345e5a0aa80091a6cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strchr
memset
strcspn
atoi
strstr
memcpy
strtoul
strncpy
srand
rand
kernel32
LoadLibraryA
CloseHandle
WriteFile
lstrlenA
CreateFileA
lstrcatA
GetTickCount
GetTempPathA
GetModuleFileNameA
GetProcAddress
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
LocalFree
LocalAlloc
CreateProcessA
SetErrorMode
CreateThread
WaitForSingleObject
InterlockedExchange
CopyFileA
TerminateProcess
DisconnectNamedPipe
ReadFile
ExitProcess
CreateNamedPipeA
SetFilePointer
GetWindowsDirectoryA
DeleteFileA
Sleep
ConnectNamedPipe
VirtualProtect
ExitProcess
user32
wsprintfA
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CreateServiceA
StartServiceA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoInitializeEx
ws2_32
setsockopt
WSAGetLastError
WSASocketA
recv
connect
gethostbyname
inet_addr
WSAIoctl
WSAStartup
send
socket
closesocket
htons
sendto
htonl
Exports
Exports
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 984B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ