Behavioral task
behavioral1
Sample
8cec62d101ff2c327d3ea82508141794606207e62b6b493489c88027931baeb4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cec62d101ff2c327d3ea82508141794606207e62b6b493489c88027931baeb4.dll
Resource
win10v2004-20220812-en
General
-
Target
8cec62d101ff2c327d3ea82508141794606207e62b6b493489c88027931baeb4
-
Size
140KB
-
MD5
4c3c98a2bc24f6916b99bb98d95236a0
-
SHA1
a80f93ca10f5d840075d9f0a8637eabc765a1a31
-
SHA256
8cec62d101ff2c327d3ea82508141794606207e62b6b493489c88027931baeb4
-
SHA512
94479d501cbe2081871489061446502317c590119cd4a62a185055cfe88940ccf18cc38bf8bb9cc545e26bdc56fb52652e9173562fea31711e9013d24f651b21
-
SSDEEP
3072:k1AlvtMoYAGfT1Gn0MIiCL5FxKJ1XIBrc+EH1ECoL9txX+fTP:woaxT1Q0MIuJ14hc9H1N8txm
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
8cec62d101ff2c327d3ea82508141794606207e62b6b493489c88027931baeb4.dll windows x86
d6c01a09a258af315e9ea4d064227313
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
ReleaseDC
gdi32
SelectObject
advapi32
RegOpenKeyA
Sections
.text Size: - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ