Behavioral task
behavioral1
Sample
93ae9d30f0ec9345879c15c1beb54ccca0a5a0a3a801b72835d981fc9174061f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93ae9d30f0ec9345879c15c1beb54ccca0a5a0a3a801b72835d981fc9174061f.exe
Resource
win10v2004-20221111-en
General
-
Target
93ae9d30f0ec9345879c15c1beb54ccca0a5a0a3a801b72835d981fc9174061f
-
Size
795KB
-
MD5
70e83a231020bee01a23339f32992333
-
SHA1
1577205e1bb64fcc269f51ebc844372b105694df
-
SHA256
93ae9d30f0ec9345879c15c1beb54ccca0a5a0a3a801b72835d981fc9174061f
-
SHA512
b87367f033750e219a3b1423f7f52b22d8a4e60d1f6d7f3f7d44cc4825dca553c88f2b54d4cc79e3fc30e759895eb6f0c1fa55181330d968ee67c7b53e37fe1d
-
SSDEEP
24576:xVcM6r2IU4lZ41HQWUXuLselG1zjWpSh+O1:xF42IVMHMeLselodM4
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
93ae9d30f0ec9345879c15c1beb54ccca0a5a0a3a801b72835d981fc9174061f.exe windows x86
f6ec33cb8bddcd7a9230db78c49615c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memset
ExAllocatePoolWithTag
ObQueryNameString
RtlAssert
ZwClose
ObReferenceObjectByHandle
IoFileObjectType
IoCreateFileSpecifyDeviceObjectHint
IofCompleteRequest
ObfDereferenceObject
RtlCompareMemory
KeInsertQueueApc
KeInitializeApc
ExAllocatePool
MmMapIoSpace
MmGetPhysicalAddress
IoDeleteSymbolicLink
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeGetCurrentThread
KeDelayExecutionThread
KeSetPriorityThread
MmUnmapIoSpace
KeInitializeEvent
IoAttachDeviceToDeviceStack
ObReferenceObjectByName
IoDriverObjectType
RtlCopyUnicodeString
_except_handler3
PoCallDriver
PoStartNextPowerIrp
IofCallDriver
memcpy
IoGetCurrentProcess
PsGetVersion
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
wcslen
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
DbgPrint
PsGetCurrentThreadId
PsGetCurrentProcessId
ZwQuerySystemInformation
RtlCompareString
strncpy
strlen
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
strcpy
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
IoDetachDevice
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 706KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 794KB - Virtual size: 793KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ