Behavioral task
behavioral1
Sample
4dcc5fffb27a4f2e22e5716cad91ee708a9877c2ad21622101ed21aab911413f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4dcc5fffb27a4f2e22e5716cad91ee708a9877c2ad21622101ed21aab911413f.exe
Resource
win10v2004-20220901-en
General
-
Target
4dcc5fffb27a4f2e22e5716cad91ee708a9877c2ad21622101ed21aab911413f
-
Size
868KB
-
MD5
134cdd8bc02a355956a3b7fea55ba34e
-
SHA1
efa04ea29ab6b01648efd92053aece0804756226
-
SHA256
4dcc5fffb27a4f2e22e5716cad91ee708a9877c2ad21622101ed21aab911413f
-
SHA512
2ea9a3128a3a4863af94f6fc8c2d1a8c5703036af359178135a988b141114a9d0711300f6650be96bc28044b62e2249f6e5ad697e7e10d9731bfbeee92705b48
-
SSDEEP
24576:BlHD9ab4dpmkIK+BL5FQV6CtWj8n4cjGOEJPy:fQUXmkIKg5qPtWj5cjy
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
4dcc5fffb27a4f2e22e5716cad91ee708a9877c2ad21622101ed21aab911413f.exe windows x86
bb7845aee61e9e95fb065dfdbc9ac91e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoRegisterBootDriverReinitialization
IofCompleteRequest
IofCallDriver
RtlAssert
KeSetEvent
KeWaitForSingleObject
KeInitializeEvent
memcpy
ExFreePoolWithTag
ZwWriteFile
ZwReadFile
memset
ExAllocatePoolWithTag
MmMapLockedPagesSpecifyCache
ExfInterlockedRemoveHeadList
PsTerminateSystemThread
KeSetPriorityThread
KeGetCurrentThread
ZwClose
IoDeleteDevice
IoDetachDevice
ObReferenceObjectByHandle
PsCreateSystemThread
IoAttachDeviceToDeviceStack
IoCreateDevice
ObfDereferenceObject
IoFreeIrp
IoBuildAsynchronousFsdRequest
_allmul
IoVolumeDeviceToDosName
_alldiv
ExfInterlockedInsertTailList
IoUnregisterPlugPlayNotification
RtlInitUnicodeString
MmGetSystemRoutineAddress
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
RtlCopyUnicodeString
RtlCompareUnicodeString
IoGetDeviceObjectPointer
IoBuildSynchronousFsdRequest
PsGetCurrentProcessId
strlen
ExAllocatePool
strcpy
_except_handler3
IoGetCurrentProcess
PsGetVersion
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
IoCreateSymbolicLink
RtlAppendUnicodeToString
wcslen
IoDeleteSymbolicLink
RtlFreeUnicodeString
RtlAppendUnicodeStringToString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
DbgPrint
PsGetCurrentThreadId
ZwQuerySystemInformation
RtlCompareString
strncpy
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ZwFsControlFile
IoRegisterPlugPlayNotification
ZwSetInformationFile
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 756KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 866KB - Virtual size: 866KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ