Behavioral task
behavioral1
Sample
44253b65945a10c4d31eb330b522b0ebe5ca864d8d251c24f2ed085d12f9eaf9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44253b65945a10c4d31eb330b522b0ebe5ca864d8d251c24f2ed085d12f9eaf9.dll
Resource
win10v2004-20221111-en
General
-
Target
44253b65945a10c4d31eb330b522b0ebe5ca864d8d251c24f2ed085d12f9eaf9
-
Size
128KB
-
MD5
61e3df2105a2c6a07d384c77936b6480
-
SHA1
125b98b99c9c42040cfdcacd5d15cb84cd464381
-
SHA256
44253b65945a10c4d31eb330b522b0ebe5ca864d8d251c24f2ed085d12f9eaf9
-
SHA512
bdb53b2019daa10938bac4afe9ca4cc49fb27260201d06f1ee4d44621642b7a2090ef4faae806ca68511a2a942455008a292c9cb658634ca80d5bbef8f82600e
-
SSDEEP
3072:D4RQ4ePLz3UKePSuYA/DVyp43+waA34zzw84T5Yf8a:sRZenlequYWDXo043F4T5Yf8
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
44253b65945a10c4d31eb330b522b0ebe5ca864d8d251c24f2ed085d12f9eaf9.dll windows x86
1f503878e949aadc9a6d099a30c7520e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
OpenFileMappingA
GetCurrentProcess
ReadProcessMemory
SetLastError
FlushInstructionCache
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
OutputDebugStringA
EnterCriticalSection
Sleep
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
HeapAlloc
GetCommandLineA
GetVersion
RtlUnwind
HeapFree
RaiseException
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
FlushFileBuffers
CloseHandle
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ReadFile
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetModuleHandleA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
FindWindowA
GetWindowRect
GetAsyncKeyState
GetCursorPos
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ