Behavioral task
behavioral1
Sample
8057232dd2b7a1c71e8892048c6c564a037fc99e96493969fc6e9687ae55293c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8057232dd2b7a1c71e8892048c6c564a037fc99e96493969fc6e9687ae55293c.exe
Resource
win10v2004-20221111-en
General
-
Target
8057232dd2b7a1c71e8892048c6c564a037fc99e96493969fc6e9687ae55293c
-
Size
70KB
-
MD5
c3286dce89e9472eeca951b9c9c1c669
-
SHA1
54e03ff1b844d5431cd52cdd4dc5c77fd0cab627
-
SHA256
8057232dd2b7a1c71e8892048c6c564a037fc99e96493969fc6e9687ae55293c
-
SHA512
9c34f19416c6014fa23006151a14664763492ca65022844fabeeb67efeb932af4770adb07f8b7bccd0738e1d943fd957b1fe55940abf4a75a761b98a749ce25a
-
SSDEEP
1536:JmqU5QDdn3gtyqop/VHrIvAbaVUQMC8WuNoikrGMQqNPFxV:JmdQQ8pphKV5E9MJ
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
8057232dd2b7a1c71e8892048c6c564a037fc99e96493969fc6e9687ae55293c.exe windows x86
f69b74e263d8f0da8f5743068285772b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetModuleHandleA
GetProcAddress
VirtualProtect
shell32
StrStrIA
msvcrt
rand
user32
MessageBoxA
Sections
.text Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ