Behavioral task
behavioral1
Sample
54a4bfd98528c8c8e9422e3d5660d884d22b73587621c5172d62e035c8c39672.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54a4bfd98528c8c8e9422e3d5660d884d22b73587621c5172d62e035c8c39672.dll
Resource
win10v2004-20221111-en
General
-
Target
54a4bfd98528c8c8e9422e3d5660d884d22b73587621c5172d62e035c8c39672
-
Size
196KB
-
MD5
63d26084240a1083e33eba264ce7d650
-
SHA1
d5054d8c07eb3d0e2f8ea28a114d688fc7e7871a
-
SHA256
54a4bfd98528c8c8e9422e3d5660d884d22b73587621c5172d62e035c8c39672
-
SHA512
315df36c4fde2778ff54bffe1387d4b10ac95eed82cdc83f9a498d9d0520f977fd4c01a91d0464c9ea0725940317d61369b8ab7eb7daceded07049b7762929a3
-
SSDEEP
3072:eCeD0tQpAwQxjDxVtWBeLHigH/4uvxCoqrpr0qqzPznaDf56mUGnGwRYxCoOFL3M:e7mppDEiwuZCoq10tXO6m1nGwCxgFL3
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
54a4bfd98528c8c8e9422e3d5660d884d22b73587621c5172d62e035c8c39672.dll windows x86
ee3aba4b5915a820fed1b94e27f00b27
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetProcAddress
TerminateProcess
OpenProcess
GetCurrentProcessId
GetModuleHandleA
WriteProcessMemory
GetModuleHandleW
DisableThreadLibraryCalls
IsProcessorFeaturePresent
OutputDebugStringA
RtlUnwind
HeapAlloc
GetVersion
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
VirtualProtect
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetAsyncKeyState
GetCursorPos
GetForegroundWindow
ScreenToClient
MessageBeep
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ