_???������3��D��
Behavioral task
behavioral1
Sample
0e394f7c4ba15354c796d41b1e1ce5ff77ec35b2a8f7bf31d2bd9c2d5d8a09b5.dll
Resource
win7-20220812-en
General
-
Target
0e394f7c4ba15354c796d41b1e1ce5ff77ec35b2a8f7bf31d2bd9c2d5d8a09b5
-
Size
368KB
-
MD5
857901d264a52d717b6a2de4563c6250
-
SHA1
ce0b20fd521a51c9aedec978330802e01b32933e
-
SHA256
0e394f7c4ba15354c796d41b1e1ce5ff77ec35b2a8f7bf31d2bd9c2d5d8a09b5
-
SHA512
287216ed2772d8c51acc3bc81b621ee4d29569ba1f0f6b55699a06643fb91b53cbc5201536fbeba47d04150ead07b08ee6d37f263375bde90e8aafbed9c7a4e0
-
SSDEEP
6144:G24PTnIQ/Qb7ZSJ0J23fvybd3SROJBuKntNxFkEDZ/0MpY/po/Wl2LooI8OOPxo:G2GMQ/aZSssny5iMGyZ8F/poelAPo
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
0e394f7c4ba15354c796d41b1e1ce5ff77ec35b2a8f7bf31d2bd9c2d5d8a09b5.dll windows x86
e580922abaab65d4943090fe1db34358
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
Process32First
Process32Next
CreateWaitableTimerA
SetWaitableTimer
MultiByteToWideChar
GetModuleHandleA
Thread32First
Thread32Next
OpenThread
TerminateThread
ResumeThread
GetCurrentThreadId
SuspendThread
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetFileAttributesA
GetPrivateProfileStringA
DeleteFileA
GetLocalTime
FreeLibrary
LoadLibraryA
LCMapStringA
GetVersionExA
DeviceIoControl
CreateFileA
GetProcAddress
LoadLibraryExA
OpenProcess
CloseHandle
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetFilePointer
GetOEMCP
Module32First
GetCommandLineA
CreateToolhelp32Snapshot
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
GetCurrentProcess
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
InterlockedDecrement
InterlockedIncrement
RtlUnwind
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
LCMapStringW
RaiseException
VirtualAlloc
GetCPInfo
GetACP
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowLongA
RegisterHotKey
UnregisterHotKey
KillTimer
MsgWaitForMultipleObjects
IsWindow
SetTimer
GetWindowTextA
CallWindowProcA
GetClassNameA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
psapi
GetMappedFileNameA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 336KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ