Behavioral task
behavioral1
Sample
d7c2b725e5c98ea7058a43f7f65570a5ba0aa4a08c78afd3275f4a4aaf9b7439.exe
Resource
win7-20220812-en
General
-
Target
d7c2b725e5c98ea7058a43f7f65570a5ba0aa4a08c78afd3275f4a4aaf9b7439
-
Size
610KB
-
MD5
35cd8cd755c20f0cc404440be0e0362d
-
SHA1
4fbec17651bded31b67fd47c9222b35432b6ccf6
-
SHA256
d7c2b725e5c98ea7058a43f7f65570a5ba0aa4a08c78afd3275f4a4aaf9b7439
-
SHA512
b89b52b68f1e2b44463838b2ee4a173996ffe69654d64fcdb0946348cc7d39af4af10c62cddf8ea01acc4d277bbd5721d86c0f69aa956031cd0629236e84bbd1
-
SSDEEP
6144:EAF5CkAv+5axd+4TQHZkrpzsIzLZdsVTQZNDV8bUXnwirn1RPuFq3v9:EboRQQHizsIzgVkD1Xn3Lus3v
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
d7c2b725e5c98ea7058a43f7f65570a5ba0aa4a08c78afd3275f4a4aaf9b7439.exe windows x86
11cbdfb47fdc9152560598c88ea044f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
LoadCursorA
MessageBoxA
advapi32
RegEnumKeyExA
ole32
CoTaskMemRealloc
oleaut32
SysStringLen
gdi32
GetStockObject
ntdll
RtlFreeHeap
Sections
.text Size: - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 374KB - Virtual size: 429KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ