Behavioral task
behavioral1
Sample
a922cd2c4a7fbe8dc946e4ae78790a89821371bb22dd16a8446c6af41e6ce1f1.exe
Resource
win7-20221111-en
General
-
Target
a922cd2c4a7fbe8dc946e4ae78790a89821371bb22dd16a8446c6af41e6ce1f1
-
Size
1.4MB
-
MD5
64784f79c2dc76bc84a4c8dae2f8f0dd
-
SHA1
1779ce82ad4e9c3269ec0930c0794161d58b8445
-
SHA256
a922cd2c4a7fbe8dc946e4ae78790a89821371bb22dd16a8446c6af41e6ce1f1
-
SHA512
caf4cd11e2e14eb791fc22fe1a7fdd17cc48001967af40fd5519a273dd4d94b0f1bd2a2bd7a4e4eac171451b42c8607833b8a1eab99db0f127bb23b0db886d44
-
SSDEEP
24576:q1O9RL/wEfn0lGw1cV5H/G+RjZvT+0wASjKY/18UEWzAoUGahSTzgXssWfjOOGpf:R9RL/wEv0lz1u9jR+0wAS+E1Preu0yjN
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a922cd2c4a7fbe8dc946e4ae78790a89821371bb22dd16a8446c6af41e6ce1f1.exe windows x86
959a780463af4fab4b1be4b041ac6fa1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamRestart
ws2_32
recv
kernel32
GlobalLock
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
IsWindowVisible
gdi32
GetClipBox
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
OleCreateFontIndirect
comctl32
ord17
oledlg
ord8
comdlg32
ChooseColorA
Sections
.text Size: - Virtual size: 539KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 925KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ