Behavioral task
behavioral1
Sample
dbccb2d7fc61bd4975c2c5c463bf6bbcfde7757d92c0da3af8f1e6bd4be5a6ce.exe
Resource
win7-20220901-en
General
-
Target
dbccb2d7fc61bd4975c2c5c463bf6bbcfde7757d92c0da3af8f1e6bd4be5a6ce
-
Size
1.7MB
-
MD5
62a6aae198a2b696bc8d861540703975
-
SHA1
3fa57de671e800928d3a57f970153d2d87226830
-
SHA256
dbccb2d7fc61bd4975c2c5c463bf6bbcfde7757d92c0da3af8f1e6bd4be5a6ce
-
SHA512
557223dc5823c07393e2911fd5f14b62153ab677317eae36d98415e7d7580ffdcd2cf41233013b9e3f02b5efd823df2e817cd573dc389f4ca5109423d0a483b0
-
SSDEEP
49152:oEFCnRyctPkB+bf1KAgmlJzE7VzlgwAvDK7N7mhCgl3W+:oEFCnRWEQAhlBE7VhCDK52TRW
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
dbccb2d7fc61bd4975c2c5c463bf6bbcfde7757d92c0da3af8f1e6bd4be5a6ce.exe windows x86
25f47b809f56132ebe83b15f21b84c05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
UnhookWindowsHookEx
gdi32
CreateSolidBrush
winmm
midiStreamProperty
winspool.drv
ClosePrinter
advapi32
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CoGetClassObject
oleaut32
VariantChangeType
comctl32
ImageList_Destroy
oledlg
ord8
ws2_32
recvfrom
comdlg32
GetOpenFileNameA
Sections
.text Size: - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 978KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE