Behavioral task
behavioral1
Sample
a4f3f3a23f46e5222e75bbccb559b999ee4f8d6bea90487197f71b90fbadf1a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4f3f3a23f46e5222e75bbccb559b999ee4f8d6bea90487197f71b90fbadf1a3.exe
Resource
win10v2004-20220812-en
General
-
Target
a4f3f3a23f46e5222e75bbccb559b999ee4f8d6bea90487197f71b90fbadf1a3
-
Size
212KB
-
MD5
30f55be60fa7313ee56c4c0d3b899ab4
-
SHA1
a48ba7661eb6a7847bd3bf1901b41dfce133ab05
-
SHA256
a4f3f3a23f46e5222e75bbccb559b999ee4f8d6bea90487197f71b90fbadf1a3
-
SHA512
619929ea9d81cf29a750c8bc6248f5e2cce4b24ee51b899f49f0fb3f3672c3bd722c4a2ac13e281d59b90a4cb628603f2d5c4237b05a51362125dd1905cdb8ca
-
SSDEEP
6144:MJqjA/unSCqOEGuKEqFyUFWdXbLli/UXwwvE:MJ3unTl7EuycWFHYsXNE
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a4f3f3a23f46e5222e75bbccb559b999ee4f8d6bea90487197f71b90fbadf1a3.exe windows x86
6c29f28ef4f33d7a9f168c2fc2ef1acc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_strlwr
_strnicmp
_itoa
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
strstr
strncpy
_CxxThrowException
__CxxFrameHandler
strcmp
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
memset
strchr
strncat
strcat
tolower
toupper
_ftol
srand
rand
strlen
strcpy
_except_handler3
_stricmp
kernel32
GetStartupInfoA
MultiByteToWideChar
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetLastError
CreateDirectoryA
lstrcpyA
lstrlenA
CloseHandle
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
GetTickCount
lstrcatA
GetSystemDirectoryA
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
MoveFileA
SetFileTime
WideCharToMultiByte
SystemTimeToFileTime
SetFilePointer
WriteFile
CreateFileA
lstrcmpiA
GetModuleFileNameA
Sleep
WaitForSingleObject
CreateEventA
OpenEventA
SetUnhandledExceptionFilter
GetCommandLineA
LocalFileTimeToFileTime
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfA
MessageBoxA
advapi32
GetUserNameA
GetServiceKeyNameA
StartServiceA
ControlService
OpenSCManagerA
CreateServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
shlwapi
SHDeleteKeyA
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 200KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ