Behavioral task
behavioral1
Sample
32ce9ca7405c33d7a26cb31377923115f090f0818b60ed0a9520ddc3ba5e2871.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32ce9ca7405c33d7a26cb31377923115f090f0818b60ed0a9520ddc3ba5e2871.exe
Resource
win10v2004-20220812-en
General
-
Target
32ce9ca7405c33d7a26cb31377923115f090f0818b60ed0a9520ddc3ba5e2871
-
Size
771KB
-
MD5
5bb6c46793ac102c9393ba8f4d42d33a
-
SHA1
156e480b736a244a354222e97ac0105b680f6155
-
SHA256
32ce9ca7405c33d7a26cb31377923115f090f0818b60ed0a9520ddc3ba5e2871
-
SHA512
e414bb61aaa013eb7a153597e1ca1a796d8b9049990124436d511eadbee2c95b00218141d6dbdc7fa1ee0251f50d564c71a7f5e15dced996bb0fb6819dc243d7
-
SSDEEP
24576:AgMfc212+eW1Y3xhqF77rDdEgF2LpGOTDlxMug:ZMfc212K1Y3vqFDGgcXM
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
32ce9ca7405c33d7a26cb31377923115f090f0818b60ed0a9520ddc3ba5e2871.exe windows x86
e322a6f760956d591c02692fc3539c4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmProbeAndLockPages
ExFreePoolWithTag
IoAllocateMdl
_except_handler3
RtlAssert
IoDeleteDevice
IoCreateSymbolicLink
IoDeleteSymbolicLink
IoGetCurrentProcess
ObfDereferenceObject
PsGetVersion
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
IoCreateDevice
RtlAppendUnicodeToString
wcslen
RtlFreeUnicodeString
IoFreeMdl
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ExAllocatePool
ZwQuerySystemInformation
RtlCompareString
strncpy
strlen
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ExAllocatePoolWithTag
strcpy
ZwReadFile
ZwQueryInformationFile
memset
IofCompleteRequest
RtlAppendUnicodeStringToString
memcpy
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 886B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 671KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 770KB - Virtual size: 769KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ