Behavioral task
behavioral1
Sample
64f231c122e3f6acf4a414f2b3aa1f44d63c065e4ba6c4a14af7f074cc1cfd56.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
64f231c122e3f6acf4a414f2b3aa1f44d63c065e4ba6c4a14af7f074cc1cfd56.dll
Resource
win10v2004-20221111-en
General
-
Target
64f231c122e3f6acf4a414f2b3aa1f44d63c065e4ba6c4a14af7f074cc1cfd56
-
Size
47KB
-
MD5
2c15b2ad2b8d57371217175aa68f57e0
-
SHA1
a051ccbe104a83fa43b05663f0b7e7cf4a59e2c1
-
SHA256
64f231c122e3f6acf4a414f2b3aa1f44d63c065e4ba6c4a14af7f074cc1cfd56
-
SHA512
4250d15b814cf19556c0dd8b4d45024c0173e701a6d2cff2789526e5b0d09ee0229ee73580993c4e8ad2878f67d82de408db19c2bf8b36e0aac4ecb11870c47e
-
SSDEEP
768:AlCEcACR2DMByYgv9v7utgUALI7beFetxXVBprBBQARQkZGeMLc/2tv0rMKjD5bv:AlChVR2oN5/XVBprBBQARSA2tWjtpvZ0
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
64f231c122e3f6acf4a414f2b3aa1f44d63c065e4ba6c4a14af7f074cc1cfd56.dll windows x86
812f95da20b6b3fee0041b4928c24650
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memcmp
memcpy
strlen
strstr
_snprintf
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
kernel32
lstrcmpA
GetTempFileNameA
GetStartupInfoA
GetLastError
GetFileSize
GetExitCodeThread
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
CloseHandle
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpynA
lstrlenA
IsBadReadPtr
DeleteFileA
lstrcpyA
CreateFileMappingA
CreateFileA
MapViewOfFile
MoveFileExA
ReadFile
GetTempPathA
user32
SetTimer
MapVirtualKeyA
GetKeyboardState
KillTimer
wsprintfA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
RegisterWindowMessageA
SendMessageA
ToAscii
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1024B - Virtual size: 734B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ