Behavioral task
behavioral1
Sample
217d8073b1ca97a94fcd8b779ec53965e92e00f967737e0fa344fbee8470c9d3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
217d8073b1ca97a94fcd8b779ec53965e92e00f967737e0fa344fbee8470c9d3.dll
Resource
win10v2004-20221111-en
General
-
Target
217d8073b1ca97a94fcd8b779ec53965e92e00f967737e0fa344fbee8470c9d3
-
Size
200KB
-
MD5
4c5adc54444331c368dc41cf34889580
-
SHA1
4c3ba8da58749174bd9d70a5e55ac0c79b2f1f6b
-
SHA256
217d8073b1ca97a94fcd8b779ec53965e92e00f967737e0fa344fbee8470c9d3
-
SHA512
3a5210f616aca01c9386f05fbf8c946532767db39ebe522d6065a35ba76c8f3904205a16eca33d1f28e49f3cf6e789450853777f8e7e710030614b162609009d
-
SSDEEP
6144:WM/rRrQ4+D9fB/kLjJUfxE39Xm+5wBweJGJaXG:/U4+D9J/gJ+cm+qweJ
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
217d8073b1ca97a94fcd8b779ec53965e92e00f967737e0fa344fbee8470c9d3.dll windows x86
ee3aba4b5915a820fed1b94e27f00b27
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetProcAddress
TerminateProcess
OpenProcess
GetCurrentProcessId
GetModuleHandleA
WriteProcessMemory
GetModuleHandleW
DisableThreadLibraryCalls
IsProcessorFeaturePresent
OutputDebugStringA
RtlUnwind
HeapAlloc
GetVersion
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
VirtualProtect
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetAsyncKeyState
GetCursorPos
GetForegroundWindow
ScreenToClient
MessageBeep
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ