Behavioral task
behavioral1
Sample
053031cb44484d1d8f853f98637955fcfabf0b9dd0f50279f91a4aab43a2a942.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
053031cb44484d1d8f853f98637955fcfabf0b9dd0f50279f91a4aab43a2a942.exe
Resource
win10v2004-20220812-en
General
-
Target
053031cb44484d1d8f853f98637955fcfabf0b9dd0f50279f91a4aab43a2a942
-
Size
740KB
-
MD5
5d8d19111fe92c53d28047a2afe3ff2c
-
SHA1
1a7f003975d633055f99e34f28f6e0cf543e6f40
-
SHA256
053031cb44484d1d8f853f98637955fcfabf0b9dd0f50279f91a4aab43a2a942
-
SHA512
50d10d4b64dabd310ed8bde3aecaba729ee5c239f07737c3a5606bf4eb8e1edf50da2b3a9b18b9fdb01f12360f746e2721d20c9623e5f4fd5119845e2a6e76a9
-
SSDEEP
12288:d+ll2X/OJ1BOhjF4grJcA/7zSrs/awgdI7UfActzAPWTvWZOczpDgdjg350sWDfX:kll2X2bkjFXriAnEptdIYfAM0PWTuZO2
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
053031cb44484d1d8f853f98637955fcfabf0b9dd0f50279f91a4aab43a2a942.exe windows x86
e01509fd1726df95c705a479cc94f2d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmMapIoSpace
MmGetPhysicalAddress
IoDeleteSymbolicLink
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeGetCurrentThread
IofCompleteRequest
RtlAssert
KeDelayExecutionThread
KeSetPriorityThread
MmUnmapIoSpace
KeInitializeEvent
memset
IoAttachDeviceToDeviceStack
ObfDereferenceObject
ObReferenceObjectByName
IoDriverObjectType
IoDetachDevice
_except_handler3
PoCallDriver
PoStartNextPowerIrp
IofCallDriver
memcpy
IoGetCurrentProcess
ExAllocatePool
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
RtlAppendUnicodeToString
wcslen
RtlFreeUnicodeString
RtlAppendUnicodeStringToString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
DbgPrint
PsGetCurrentThreadId
PsGetCurrentProcessId
ZwQuerySystemInformation
RtlCompareString
strncpy
strlen
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ExAllocatePoolWithTag
strcpy
KeInitializeApc
KeInsertQueueApc
PsGetVersion
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 739KB - Virtual size: 738KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ