ServiceMain
Behavioral task
behavioral1
Sample
cf9f51c3a6f85a1db869a67ad216fe7e195cfa835d6a7654cbc07c2ad6003795.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf9f51c3a6f85a1db869a67ad216fe7e195cfa835d6a7654cbc07c2ad6003795.dll
Resource
win10v2004-20221111-en
General
-
Target
cf9f51c3a6f85a1db869a67ad216fe7e195cfa835d6a7654cbc07c2ad6003795
-
Size
55KB
-
MD5
5766f1af355fca3d208229e3fd8161b3
-
SHA1
213028303df615602e5d5db477f6f28a9d9b5174
-
SHA256
cf9f51c3a6f85a1db869a67ad216fe7e195cfa835d6a7654cbc07c2ad6003795
-
SHA512
662ea94f99a1167a988f69a34951291c7ba516ba865c1daadf40de4f3625d4a564dcdd46e2e2ee35a361626a62c875c594144621f1b46ecb0a30339b44fd48dd
-
SSDEEP
1536:C4mmrSqzj/sW3CDvzj87XN8/5YwI/JqYqMXMlwoF8QKlYf:C4miSqzj/sWyv8Lm5YwI/NxcCrG
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
cf9f51c3a6f85a1db869a67ad216fe7e195cfa835d6a7654cbc07c2ad6003795.dll windows x86
6f3da755e231e367184153ff97d9f9ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
MoveFileExA
FreeLibraryAndExitThread
DeleteFileA
CreateDirectoryA
CopyFileA
LockResource
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
GetTickCount
Process32First
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
CreateEventA
DuplicateHandle
LoadLibraryExA
GetModuleHandleA
GlobalMemoryStatusEx
GetVersionExA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
CreateThread
GetModuleFileNameA
GetLongPathNameA
lstrcmpiA
OutputDebugStringA
WriteFile
GetTempPathA
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
GetLocalTime
GetStartupInfoA
ExpandEnvironmentStringsA
CreateProcessA
Sleep
CreateToolhelp32Snapshot
Thread32First
Thread32Next
WaitForSingleObject
TerminateProcess
Process32Next
CloseHandle
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfW
wsprintfA
EnumThreadWindows
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
GetClassNameA
MoveWindow
FindWindowExA
PostMessageA
MessageBoxA
advapi32
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegQueryValueExA
QueryServiceStatus
StartServiceA
RegSetValueExA
RegCreateKeyExA
CreateServiceA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegOpenKeyExA
ws2_32
gethostbyname
inet_addr
WSAStartup
setsockopt
getsockopt
closesocket
connect
htons
socket
send
gethostname
recv
ntdll
RtlInitUnicodeString
_strcmpi
RtlEqualUnicodeString
NtQueryObject
NtQuerySystemInformation
wtsapi32
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MySec Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ