_???������3��D��
Behavioral task
behavioral1
Sample
6d832e1d0dd9c1239f498b28fe09b1f10dfa7b17164e9d9b12f4aff0c8ecfe67.dll
Resource
win7-20220812-en
General
-
Target
6d832e1d0dd9c1239f498b28fe09b1f10dfa7b17164e9d9b12f4aff0c8ecfe67
-
Size
361KB
-
MD5
e543fd79ad6adb0e2df3c08915d3ce90
-
SHA1
f286141f62f44d1622843f7dec3550769743c6ba
-
SHA256
6d832e1d0dd9c1239f498b28fe09b1f10dfa7b17164e9d9b12f4aff0c8ecfe67
-
SHA512
34b30913b0e0a497bbd98e0afc8ad868ba829b233fec96a7016687275868bd028b1ad157355a1981ad26ab21dcdcbb21b76d0439bc89ce9827ebd7af58ec0572
-
SSDEEP
6144:o5DjIQ+tPV3PcenD9nIVS7PgZ/D8o4+QAQj/8IHDZrusqFQo++XTkoUC/b:oT+FtUcedZ7jmAi/8IlKsqFQo+u
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
6d832e1d0dd9c1239f498b28fe09b1f10dfa7b17164e9d9b12f4aff0c8ecfe67.dll windows x86
282c990664d4c0ef0a13fa2ef5cb3f99
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
MultiByteToWideChar
CreateWaitableTimerA
SetWaitableTimer
GetModuleHandleA
Thread32First
Thread32Next
OpenThread
TerminateThread
ResumeThread
GetCurrentThreadId
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetFileAttributesA
GetPrivateProfileStringA
DeleteFileA
GetLocalTime
GetCommandLineA
FreeLibrary
LCMapStringA
GetVersionExA
DeviceIoControl
CreateFileA
GetProcAddress
LoadLibraryExA
OpenProcess
CloseHandle
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
Module32First
LoadLibraryA
CreateToolhelp32Snapshot
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
GetCurrentProcess
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
KillTimer
CallWindowProcA
SetWindowLongA
RegisterHotKey
UnregisterHotKey
MsgWaitForMultipleObjects
GetWindowTextA
SetTimer
GetClassNameA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
psapi
GetMappedFileNameA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 344KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ