Behavioral task
behavioral1
Sample
d6c8b6e6d953a654609823741eaffa8be659aa37d6ed5c02196ef21eb6fbed61.exe
Resource
win7-20220812-en
General
-
Target
d6c8b6e6d953a654609823741eaffa8be659aa37d6ed5c02196ef21eb6fbed61
-
Size
427KB
-
MD5
a3a53d431803e41673297e60047e9b0f
-
SHA1
3c78e12ec121000ab3c477069c012570afb5e5df
-
SHA256
d6c8b6e6d953a654609823741eaffa8be659aa37d6ed5c02196ef21eb6fbed61
-
SHA512
2068751208f063269b9c4807867e68cc4be2dc2d90a0049b39a5239369e4df6bb4f0d56f7cb896db57b5403b3d1c6474894ee8a5ffc7ffee522ed5cb3bac8113
-
SSDEEP
6144:TX/H666666666666arS/ZcxZKFfOpCm/xaUhcCHEEfGQjW+wnBRYc7SYMfehslYU:TXIqxECm/DcdE+N1nXYcUfemlYuYNyN
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
d6c8b6e6d953a654609823741eaffa8be659aa37d6ed5c02196ef21eb6fbed61.exe windows x86
11cbdfb47fdc9152560598c88ea044f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
LoadCursorA
MessageBoxA
advapi32
RegEnumKeyExA
ole32
CoTaskMemRealloc
oleaut32
SysStringLen
gdi32
GetStockObject
ntdll
RtlFreeHeap
Sections
.text Size: - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 257KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ