Behavioral task
behavioral1
Sample
70aa0f50475d8ec9bd3830f31d96fe5a87308c5909d5c7ca88e3681ac50e0d27.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
70aa0f50475d8ec9bd3830f31d96fe5a87308c5909d5c7ca88e3681ac50e0d27.dll
Resource
win10v2004-20220812-en
General
-
Target
70aa0f50475d8ec9bd3830f31d96fe5a87308c5909d5c7ca88e3681ac50e0d27
-
Size
196KB
-
MD5
c1ffae11a4acb720f516d8988cceabf0
-
SHA1
e11730b1dcc5eeeb14aa7035c0873b7faefe978e
-
SHA256
70aa0f50475d8ec9bd3830f31d96fe5a87308c5909d5c7ca88e3681ac50e0d27
-
SHA512
ee737dd3abe38e3bc9356abf0ad57413e683065d3232249663976f3e072e3f4b27255df311478d6d5dd6871defa08fea0db4d23e26f6fbdd63a8332246955bd3
-
SSDEEP
6144:893MCxYZcjylWzQ4QgArgt1lj3jkXPZa7KZJl:w8rlJWlj3Afl
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
70aa0f50475d8ec9bd3830f31d96fe5a87308c5909d5c7ca88e3681ac50e0d27.dll windows x86
ee3aba4b5915a820fed1b94e27f00b27
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetProcAddress
TerminateProcess
OpenProcess
GetCurrentProcessId
GetModuleHandleA
WriteProcessMemory
GetModuleHandleW
DisableThreadLibraryCalls
IsProcessorFeaturePresent
OutputDebugStringA
RtlUnwind
HeapAlloc
GetVersion
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
VirtualProtect
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetAsyncKeyState
GetCursorPos
GetForegroundWindow
ScreenToClient
MessageBeep
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ