Behavioral task
behavioral1
Sample
9324a48aba9c054fe490d9f8397517de3bd0523972d57158cf3b7ac3df36923c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9324a48aba9c054fe490d9f8397517de3bd0523972d57158cf3b7ac3df36923c.exe
Resource
win10v2004-20220812-en
General
-
Target
9324a48aba9c054fe490d9f8397517de3bd0523972d57158cf3b7ac3df36923c
-
Size
260KB
-
MD5
e66eb6cb35959b34146bbc675010c03d
-
SHA1
cdcfa8e39af6e01c7e73d027fc353ae3f62c4808
-
SHA256
9324a48aba9c054fe490d9f8397517de3bd0523972d57158cf3b7ac3df36923c
-
SHA512
854138769a5a5c11204d9d28136019261a9e36430e1ccad501acd0bdc2131c8f726d3b432a74606912dd33d0e4d625b2f604134894043f835c03d902418f2b06
-
SSDEEP
6144:FV7b6hO3uTDlUgr4sRSFszh68q6ZSkRZxptE5H0lk:FV7bh3uVUgcxFs15ZSkRrpa/
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
9324a48aba9c054fe490d9f8397517de3bd0523972d57158cf3b7ac3df36923c.exe windows x86
d2447f8abfeb452dd724d2ae3bb611f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
kernel32
OpenProcess
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetStartupInfoA
CloseHandle
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetProcAddress
RaiseException
SetLastError
GetModuleHandleA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
HeapAlloc
SetUnhandledExceptionFilter
HeapFree
MultiByteToWideChar
Sleep
DeviceIoControl
GetVersion
MoveFileA
LocalAlloc
FindFirstFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
DeleteFileA
GetPrivateProfileStringA
lstrcmpA
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
lstrcpyA
ResetEvent
WideCharToMultiByte
LoadLibraryA
TerminateThread
TlsAlloc
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
GetCurrentThreadId
CreateThread
GetLastError
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
UpdateWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
DestroyCursor
LoadCursorA
ShowWindow
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
SetWindowPos
TranslateMessage
GetDlgItem
SendMessageA
GetClientRect
CloseWindow
mouse_event
CloseClipboard
SetClipboardData
CreateWindowExA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
GetMessageA
DispatchMessageA
BlockInput
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetCursorInfo
MessageBoxA
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
LookupAccountNameA
LsaClose
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
LsaRetrievePrivateData
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
CoUninitialize
oleaut32
SysFreeString
winmm
waveInStart
ws2_32
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
closesocket
gethostname
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
WSACleanup
WSAStartup
send
select
recv
ntohs
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: - Virtual size: 429KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ