Behavioral task
behavioral1
Sample
88644b6c7f4f9f5b8dd0b8df891b1dda8abe5c0230d1a3ad23142722a015c7c8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88644b6c7f4f9f5b8dd0b8df891b1dda8abe5c0230d1a3ad23142722a015c7c8.exe
Resource
win10v2004-20220812-en
General
-
Target
88644b6c7f4f9f5b8dd0b8df891b1dda8abe5c0230d1a3ad23142722a015c7c8
-
Size
135KB
-
MD5
49da45d1390201b6f770864402de125c
-
SHA1
c1e6dffbd1c843a5183bd65726a02525ffbd4603
-
SHA256
88644b6c7f4f9f5b8dd0b8df891b1dda8abe5c0230d1a3ad23142722a015c7c8
-
SHA512
f91f8beeaa261d794a6deace9ada9b7781aba1d1ada5398156d30800b46bd9cff7df6753ff57f714cd9da55fe22864cc2852821865b9b98b5461b19e51756977
-
SSDEEP
3072:vsi/0hhfx3jeNvkMO+niR2Sh1bsKo8h8Bma/Ytd2Fs8NRMp:vsi/o9tjeNsM5niMSh1QKo8h8dA/2i8Q
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
88644b6c7f4f9f5b8dd0b8df891b1dda8abe5c0230d1a3ad23142722a015c7c8.exe windows x86
a1826d19533eeb69b93c0f973003ad03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PeekMessageA
MessageBoxA
kernel32
ExitProcess
GetModuleHandleA
GetProcAddress
VirtualProtect
advapi32
RegCreateKeyExA
msvcrt
realloc
Sections
.text Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ