Behavioral task
behavioral1
Sample
0088f465e4e725111e0923f9aa8852a84870a905b27d63aac28b0e4bfb3bd01e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0088f465e4e725111e0923f9aa8852a84870a905b27d63aac28b0e4bfb3bd01e.dll
Resource
win10v2004-20220812-en
General
-
Target
0088f465e4e725111e0923f9aa8852a84870a905b27d63aac28b0e4bfb3bd01e
-
Size
116KB
-
MD5
afd03fd983415b00e69387c17b4166d0
-
SHA1
871e4ca2a556fce80ecb8c0aacec1aff64b8fa08
-
SHA256
0088f465e4e725111e0923f9aa8852a84870a905b27d63aac28b0e4bfb3bd01e
-
SHA512
d8365d86ad650d85e5e7716e2642a346016592ac61e22a565daf6d884666b33c4e4e6357dcc62c0d98b48a39df9a04aef3b705a293398c3d8f082c12d552f58a
-
SSDEEP
1536:EEfzAm4wET0BIL91W+BvvBCpLM++JUHWWs1O3R+Cj3gFN8PsSQgsgihkSLR5iu24:EECT0BIPW+vIM+aI6O3InmZP0t/ieUI
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
0088f465e4e725111e0923f9aa8852a84870a905b27d63aac28b0e4bfb3bd01e.dll windows x86
5ba8bfb0a654cf435b86de029abb9f14
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
ReadProcessMemory
GetCurrentProcess
SetLastError
VirtualProtect
FlushInstructionCache
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
OutputDebugStringA
GetCommandLineA
GetVersion
RtlUnwind
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
OpenFileMappingA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
FindWindowA
GetDC
ReleaseDC
GetAsyncKeyState
gdi32
Rectangle
CreateSolidBrush
CreatePen
GetStockObject
SetBkMode
SetTextColor
CreateFontA
DeleteObject
TextOutA
SelectObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ