Behavioral task
behavioral1
Sample
f9abe63b63a657e0fd7058254dd554bc40b4c1a3f7c9801a7b57e7deb759f63a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9abe63b63a657e0fd7058254dd554bc40b4c1a3f7c9801a7b57e7deb759f63a.exe
Resource
win10v2004-20221111-en
General
-
Target
f9abe63b63a657e0fd7058254dd554bc40b4c1a3f7c9801a7b57e7deb759f63a
-
Size
1.3MB
-
MD5
b7d3c9b7b8fe02baac29e43540a49387
-
SHA1
43c6a3c3e393298ba218234d403d48073a852344
-
SHA256
f9abe63b63a657e0fd7058254dd554bc40b4c1a3f7c9801a7b57e7deb759f63a
-
SHA512
761bf1e87e3412766dfe64be39ef6abc8d8198248a6a7037e5c992eaec6100f05c702a537b0bb7396a3c102f2067706aea215cfc15161e17523497458b777c3b
-
SSDEEP
24576:VXfwva6dbSY/dlCe80lhzIoyzzyDBea4ysxl0tywP/126smEebeIzYH8hEpu3Iyt:eaQIEhMzzyN4VlHwP/lsmM7H0nYI
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
f9abe63b63a657e0fd7058254dd554bc40b4c1a3f7c9801a7b57e7deb759f63a.exe windows x86
1853a298db20f356638bcfedbe30011d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutWrite
ws2_32
closesocket
kernel32
GetModuleHandleA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDlgCtrlID
gdi32
GetWindowOrgEx
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CoGetClassObject
oleaut32
SysAllocStringByteLen
comctl32
ImageList_Destroy
oledlg
ord8
comdlg32
GetSaveFileNameA
Sections
.text Size: - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 374KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE