Behavioral task
behavioral1
Sample
bc5c92d0bb35c018c9561509afe54ab2f81ad11fedb597fa8815f71ff019e728.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc5c92d0bb35c018c9561509afe54ab2f81ad11fedb597fa8815f71ff019e728.dll
Resource
win10v2004-20220812-en
General
-
Target
bc5c92d0bb35c018c9561509afe54ab2f81ad11fedb597fa8815f71ff019e728
-
Size
292KB
-
MD5
85b2eaa1f414790e2ea8a91fbf5ab757
-
SHA1
891bcc98855b5f5a8e1f375013d477a544273d17
-
SHA256
bc5c92d0bb35c018c9561509afe54ab2f81ad11fedb597fa8815f71ff019e728
-
SHA512
c56c207ad4ffaed63d84201317df7f6c5f8dc19ba1512bc6a1eb71949a3ade9620de604b2afd4545c0f0eb5b2127ba586742a4f1988c8a1b1ae47aacbd3a84f9
-
SSDEEP
3072:DwnYht02RqecV7kEvrzC5MWwEuEAcpUM06t3moZv2cmCuECQXuBkLOfcyoeso1I:DwnYhzuSCcpUAmoZ9mBCuaLOxo4W
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
bc5c92d0bb35c018c9561509afe54ab2f81ad11fedb597fa8815f71ff019e728.dll windows x86
6aba6fdb3e28ae899ef2c3e7febca622
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ExitProcess
Sleep
GetProcAddress
DisableThreadLibraryCalls
VirtualProtect
VirtualQuery
WideCharToMultiByte
GetWindowsDirectoryA
GetCurrentProcessId
ResumeThread
LoadLibraryA
CreateFileMappingA
ReleaseMutex
GetLastError
CreateMutexA
MultiByteToWideChar
lstrcatA
lstrlenA
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateSemaphoreA
CloseHandle
TlsSetValue
DuplicateHandle
GetCurrentThread
GetCurrentProcess
TlsAlloc
TlsGetValue
SetLastError
FlushInstructionCache
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetModuleFileNameA
GetVersionExA
DeviceIoControl
SetThreadPriority
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
RaiseException
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCommandLineA
HeapAlloc
GetProcessHeap
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
WriteFile
GetStdHandle
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
ReadFile
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
user32
GetWindowLongA
GetClassNameA
GetWindowThreadProcessId
EnumWindows
CallNextHookEx
UnhookWindowsHookEx
GetKeyboardLayoutNameA
SetWindowsHookExA
MessageBoxA
wsock32
WSAStartup
socket
recv
select
send
closesocket
connect
htons
gethostbyname
ioctlsocket
WSACleanup
imm32
ImmSetCandidateWindow
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ