Hai
Behavioral task
behavioral1
Sample
84bb149505d8d1b3a32527aac0dbdeeefeefdfe0d9830798057985484e3c713f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84bb149505d8d1b3a32527aac0dbdeeefeefdfe0d9830798057985484e3c713f.exe
Resource
win10v2004-20220812-en
General
-
Target
84bb149505d8d1b3a32527aac0dbdeeefeefdfe0d9830798057985484e3c713f
-
Size
285KB
-
MD5
e571fff236c7bee77e157fc3fcb9d6ea
-
SHA1
7d3fe018030a4b8d6cd95f113600615d29158e0b
-
SHA256
84bb149505d8d1b3a32527aac0dbdeeefeefdfe0d9830798057985484e3c713f
-
SHA512
ead3d54219efce992c871abf9169538c9d8ad69ba38d5142081f46d02cec64318b3749ea847013bd00f6d6ed2f4c0bdd469144d5b5b68e25fe6a278124963264
-
SSDEEP
6144:If4ciXeyVT51buHjCgvXSOhSFi62Tgbny7a34cq3H3i34X04vnyNOwmjtG:xXWmgvXJgFid5XSIN/yNmxG
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
84bb149505d8d1b3a32527aac0dbdeeefeefdfe0d9830798057985484e3c713f.exe windows x86
4de7b408cbdafb377c10bb163ab288b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
msvcrt
_acmdln
Exports
Exports
Sections
.text Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE