Behavioral task
behavioral1
Sample
ca79e49d060f789630efe412044c84f179dda8ec29c3e359ce6d00c891da54ba.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca79e49d060f789630efe412044c84f179dda8ec29c3e359ce6d00c891da54ba.dll
Resource
win10v2004-20221111-en
General
-
Target
ca79e49d060f789630efe412044c84f179dda8ec29c3e359ce6d00c891da54ba
-
Size
94KB
-
MD5
f53813ca3efc6c4a71db234e5b18b2a9
-
SHA1
245e91dacb581d726850634a57d96eb5b65ba2f1
-
SHA256
ca79e49d060f789630efe412044c84f179dda8ec29c3e359ce6d00c891da54ba
-
SHA512
b175d3091f22b6f3bdad8effbbf9fba89055e7151b212d7ff36f6a60bc677eaa1affe72fc11486dcf449ef96a5eab68f2c6167e2de689e046dc456cc652168e8
-
SSDEEP
1536:oMJmWKNEo2mN86MowNdcsL8iNVbGtU+EjsukpKCAOCZ0CrOCZfr2cbmplcgIGLJn:oMJmWKNgAJwrzoGctUL9mKXTggYlTIGd
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
ca79e49d060f789630efe412044c84f179dda8ec29c3e359ce6d00c891da54ba.dll windows x86
fedb7da80dcf0d5ae319f312fdafa740
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
Module32Next
Module32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
WideCharToMultiByte
GetPrivateProfileStringA
GetFileSize
CreateFileA
GetModuleHandleA
CreateThread
SetFilePointer
HeapAlloc
GetProcessHeap
OutputDebugStringA
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
ReadFile
FreeLibrary
user32
GetWindowThreadProcessId
GetDC
GetWindowRect
wvsprintfA
GetClassNameW
wsprintfA
GetKeyboardState
ToAscii
SendMessageA
AttachThreadInput
GetFocus
FindWindowA
GetWindow
wininet
DeleteUrlCacheEntry
urlmon
URLDownloadToFileA
gdi32
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
msvcrt
wcsncat
wcscpy
wcsstr
exit
printf
wcslen
time
srand
rand
malloc
_stricmp
tolower
_vsnprintf
_ltoa
_strupr
_strcmpi
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
strcpy
memset
memcpy
free
strncpy
sprintf
strrchr
strstr
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ