Behavioral task
behavioral1
Sample
438bcd353808a6669896630c3deaf0713022c1ab62f4b98c904a76684b49c72c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
438bcd353808a6669896630c3deaf0713022c1ab62f4b98c904a76684b49c72c.exe
Resource
win10v2004-20220812-en
General
-
Target
438bcd353808a6669896630c3deaf0713022c1ab62f4b98c904a76684b49c72c
-
Size
5.3MB
-
MD5
7091900d86224219362bdbcef9595cf1
-
SHA1
9f2033616c5e26d764c72b4a8114106c6c0b0eac
-
SHA256
438bcd353808a6669896630c3deaf0713022c1ab62f4b98c904a76684b49c72c
-
SHA512
c346c44b8b2a9287c29fc16090f2006c0d90b496049de673f5b07ad9b949ea2ddee230fb9bf8673e7dc519a7c78cc200a792a1ba2e82e12e22af08745455a4c7
-
SSDEEP
1536:4jy6ixusJfZqiTYzqfuz6jc74npxFzYNtS6Ehrn:4GxpxqiIqfu2j91kN85hrn
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
438bcd353808a6669896630c3deaf0713022c1ab62f4b98c904a76684b49c72c.exe windows x86
a5c2b9e447ac020a1e92d9faee78ee61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
CloseHandle
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetSystemTime
OpenProcess
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
CreateThread
ExitProcess
CopyFileA
Sleep
LoadLibraryA
GetProcAddress
Process32Next
FreeLibrary
GetStartupInfoA
GetModuleHandleA
VirtualProtect
GetModuleFileNameA
ExitProcess
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
msvcrt
fwrite
fclose
sprintf
rand
srand
time
fread
fseek
strstr
??2@YAPAXI@Z
_except_handler3
fputs
fgets
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??3@YAXPAX@Z
fopen
_stricmp
wininet
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
winmm
timeGetTime
netapi32
Netbios
psapi
GetModuleFileNameExA
ws2_32
htons
socket
WSAStartup
connect
send
gethostbyname
inet_addr
user32
MessageBoxA
Sections
.text Size: - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ