Behavioral task
behavioral1
Sample
8130818446ec4b9ce2925468a1bb29f7e5a1e6af7212e6f94bf3a56a8cbdd430.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8130818446ec4b9ce2925468a1bb29f7e5a1e6af7212e6f94bf3a56a8cbdd430.exe
Resource
win10v2004-20220901-en
General
-
Target
8130818446ec4b9ce2925468a1bb29f7e5a1e6af7212e6f94bf3a56a8cbdd430
-
Size
748KB
-
MD5
c073503bb1942b21e9aa2a71321918df
-
SHA1
6318fb9a12d7591a7a8a2b1ce41978902816edde
-
SHA256
8130818446ec4b9ce2925468a1bb29f7e5a1e6af7212e6f94bf3a56a8cbdd430
-
SHA512
6387be9083771a77175642046b1e58516a0ede4fcb3d348abf74d4f2d60ffc8d24c5ace9572afaf11294944d453dc3853791d3a92530945d377a083984cc1577
-
SSDEEP
12288:Nap7FQPpLQAMPNfkDwzySu5Yy1wbGWoBUtRKIOdlcqLTBge4nZH0+J:0xFQRK18DwzGYIwbUcsISlcelgLnJ
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
8130818446ec4b9ce2925468a1bb29f7e5a1e6af7212e6f94bf3a56a8cbdd430.exe windows x86
05451b8af9f2716cc4326f95b65fcb70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutClose
ws2_32
recv
rasapi32
RasHangUpA
kernel32
SetEnvironmentVariableA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
IsChild
gdi32
CreateEllipticRgn
msimg32
GradientFill
winspool.drv
DocumentPropertiesA
advapi32
RegQueryValueA
shell32
Shell_NotifyIconA
ole32
OleInitialize
oleaut32
RegisterTypeLi
comctl32
_TrackMouseEvent
wininet
InternetCloseHandle
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 630KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 736KB - Virtual size: 733KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE