??4CGame3@@QAEAAV0@ABV0@@Z
Behavioral task
behavioral1
Sample
517f8f121092f9890cc787f0a56cfbcfa4664c1c60a67cf9db1c7e8303f010a6.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
517f8f121092f9890cc787f0a56cfbcfa4664c1c60a67cf9db1c7e8303f010a6.dll
Resource
win10v2004-20220812-en
General
-
Target
517f8f121092f9890cc787f0a56cfbcfa4664c1c60a67cf9db1c7e8303f010a6
-
Size
164KB
-
MD5
6b6d4f242cb0f4baed7a25b87e99e2b0
-
SHA1
0484e9722cba8ae35eda9ac4af095ee5da4d9aca
-
SHA256
517f8f121092f9890cc787f0a56cfbcfa4664c1c60a67cf9db1c7e8303f010a6
-
SHA512
80e5778588dd8ad2a10f10f46063e77fcc0207d04e78739a48dce101552358a26347db0399de903c40729aa0616ba0a15bace12d575b3f8a33ab8487f6208285
-
SSDEEP
3072:QD6FOiGeYreY55S8Vq55c6lAVZhEk+AmB4ZtaopD27FOlDlblpPpeP:CeY55VVy57VBAA4/3lDl3Pp
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
517f8f121092f9890cc787f0a56cfbcfa4664c1c60a67cf9db1c7e8303f010a6.dll windows x86
9fcd7939307f497057c36972c77a9af3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
VirtualProtect
GetModuleHandleA
Sleep
GetProcAddress
LoadLibraryA
ReadProcessMemory
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
HeapAlloc
GetCommandLineA
GetVersion
RtlUnwind
RaiseException
HeapFree
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
FlushFileBuffers
CloseHandle
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ReadFile
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
GetWindowDC
SendInput
GetCursorPos
ScreenToClient
GetAsyncKeyState
GetSystemMetrics
FindWindowA
gdi32
GetPixel
Exports
Exports
Sections
.text Size: - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ