Behavioral task
behavioral1
Sample
7730886c280b0fac28f1258d085c1f2e242892e7e96b1b8919134f0ab63cf32f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7730886c280b0fac28f1258d085c1f2e242892e7e96b1b8919134f0ab63cf32f.dll
Resource
win10v2004-20221111-en
General
-
Target
7730886c280b0fac28f1258d085c1f2e242892e7e96b1b8919134f0ab63cf32f
-
Size
44KB
-
MD5
edece81f8562ef6b9043f591ab1c0e60
-
SHA1
104478c2397ea297aa0e12308c0c5705ab1aa537
-
SHA256
7730886c280b0fac28f1258d085c1f2e242892e7e96b1b8919134f0ab63cf32f
-
SHA512
915b1dbfd2cdb7b451de77cec39e60827482772aa2af2f5a9934ce2f769f7fbf0ca81758f71187d306cfb8c1bdc2de01689b945057279ba491f94e6b0aa3b85b
-
SSDEEP
768:6sDYIx2uXm8ZIPyRYAElRfB4KKAGnzMG0xvv8KmDlyR8cvB1qUgDZvvSxTX3e:6souXbZIPyRYNRfBhKAeop9Ayec/qUgs
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
7730886c280b0fac28f1258d085c1f2e242892e7e96b1b8919134f0ab63cf32f.dll windows x86
555d6c274e69e12b7762ed160aff77a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCurrentProcess
IsBadReadPtr
Sleep
ReadProcessMemory
Beep
IsBadWritePtr
DisableThreadLibraryCalls
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
WriteProcessMemory
CreateThread
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
GetSystemTimeAsFileTime
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
keybd_event
GetAsyncKeyState
MessageBoxA
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
msvcr90
free
_decode_pointer
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_malloc_crt
_encode_pointer
_encoded_null
Sections
.text Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 598B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ