Behavioral task
behavioral1
Sample
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
Resource
win7-20221111-en
General
-
Target
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c
-
Size
6.8MB
-
MD5
4208ed051f64f4673eab58eb9eed24c1
-
SHA1
3c5c3d6795559bddc9c36b777ce5acfc8becd473
-
SHA256
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c
-
SHA512
4e355958aeefa5056921e1dacac57fa93bf917697be86a9feda24ec26232fcad2d5f9dd3cac6bbe2216e2d3f4df050dfc757a0df5336a09433a0f8bad76a2d3d
-
SSDEEP
98304:Ax8QgejMQtmBgeXjbAaWbUhrenEPwvIcR/P5tUpoIwwGTwg+52UGXh65qmo5seaC:Atgf/AMhfovIcR3jnIww9gAAhXxseaa
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe windows x86
3ce556af414cf3df6e2983456223ea11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamOpen
ws2_32
closesocket
rasapi32
RasHangUpA
kernel32
VirtualAlloc
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
IntersectRect
gdi32
CreatePolygonRgn
winspool.drv
ClosePrinter
advapi32
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
OleInitialize
oleaut32
SysAllocString
comctl32
ImageList_DragShowNolock
wininet
InternetOpenA
comdlg32
GetOpenFileNameA
Sections
.text Size: - Virtual size: 728KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 955KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 5.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.8MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE