Behavioral task
behavioral1
Sample
18a5c2b14ef2ab69f66ce77cce6aa5fe9ca9af6a60442471f941556f2f48b988.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18a5c2b14ef2ab69f66ce77cce6aa5fe9ca9af6a60442471f941556f2f48b988.dll
Resource
win10v2004-20220901-en
General
-
Target
18a5c2b14ef2ab69f66ce77cce6aa5fe9ca9af6a60442471f941556f2f48b988
-
Size
116KB
-
MD5
5f5f778ab0b743b9a66e468c53bc8e10
-
SHA1
bb50bf362ca27959b293a741e5ac32c72170b434
-
SHA256
18a5c2b14ef2ab69f66ce77cce6aa5fe9ca9af6a60442471f941556f2f48b988
-
SHA512
8f754cab4f93ec40513b2c62977529c35175280f1055e921f61e38819a165b972a4dcaf74f99005a7e626a65b2b6498b25be771f2a30afd4a90044bf88e7a42c
-
SSDEEP
1536:wEfzAm4wET0BIL91W+BvvBCpLM++JUHWWs1O3R+Cj3gFN8PsSQgsgihkSLR5iu24:wECT0BIPW+vIM+aI6O3InmZP0t/ieUI
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
18a5c2b14ef2ab69f66ce77cce6aa5fe9ca9af6a60442471f941556f2f48b988.dll windows x86
5ba8bfb0a654cf435b86de029abb9f14
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
ReadProcessMemory
GetCurrentProcess
SetLastError
VirtualProtect
FlushInstructionCache
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
OutputDebugStringA
GetCommandLineA
GetVersion
RtlUnwind
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
OpenFileMappingA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
FindWindowA
GetDC
ReleaseDC
GetAsyncKeyState
gdi32
Rectangle
CreateSolidBrush
CreatePen
GetStockObject
SetBkMode
SetTextColor
CreateFontA
DeleteObject
TextOutA
SelectObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ