Behavioral task
behavioral1
Sample
ec7f4349029ed8ed42379fa9a231e9f3f10099177afe95d83b3518cd952db4fe.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ec7f4349029ed8ed42379fa9a231e9f3f10099177afe95d83b3518cd952db4fe.dll
Resource
win10v2004-20220812-en
General
-
Target
ec7f4349029ed8ed42379fa9a231e9f3f10099177afe95d83b3518cd952db4fe
-
Size
56KB
-
MD5
501a7a22413a68d801637718671261b0
-
SHA1
af6b2aa5307f0c7a25b3ac3c39a9693ec185fe3c
-
SHA256
ec7f4349029ed8ed42379fa9a231e9f3f10099177afe95d83b3518cd952db4fe
-
SHA512
91a8308863248ce28a313b7a5701d63d984aecb244859b6a69a70862ef706a56e00cbb45be946da7fa7ec3decbdc79d4dd8284fc2c770715bc18082296757ec5
-
SSDEEP
1536:NCNg/jP2hWHDUtJdf7XjQAwLi34M8zeRYiGtnNpMK4sSSpyg:qjf7XcA34M8EYiGtnXM0FF
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
ec7f4349029ed8ed42379fa9a231e9f3f10099177afe95d83b3518cd952db4fe.dll windows x86
6433fc334c4f4917955f0e35c0c3b4b6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetFileSize
ReadFile
CreateFileA
lstrcpynA
DeleteFileA
GetTempPathA
MultiByteToWideChar
GlobalFree
GlobalUnlock
WriteFile
GlobalLock
GlobalAlloc
Process32Next
GetTickCount
CreateToolhelp32Snapshot
GetModuleHandleA
VirtualAlloc
GetPrivateProfileStringA
CreateThread
WritePrivateProfileStringA
GetSystemTime
WideCharToMultiByte
IsBadReadPtr
SetFilePointer
GetLastError
CreateMutexA
GetCurrentProcessId
GetModuleFileNameA
lstrlenA
lstrcmpiA
lstrcmpA
Sleep
ExitProcess
VirtualProtect
lstrcpyA
GetSystemDirectoryA
lstrcatA
LoadLibraryA
GetProcAddress
FreeLibrary
Process32First
OutputDebugStringA
user32
EnumWindows
ReleaseDC
GetDC
IsRectEmpty
GetWindowThreadProcessId
FindWindowExA
FindWindowA
PrintWindow
GetWindowInfo
SetForegroundWindow
ShowWindow
GetActiveWindow
IsIconic
GetWindowTextA
GetSystemMetrics
IsWindowVisible
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
CreateDCA
DeleteObject
BitBlt
SelectObject
wininet
HttpEndRequestA
HttpSendRequestExA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCloseHandle
ws2_32
shutdown
inet_ntoa
gethostbyname
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCloneImage
GdipDisposeImage
GdipFree
GdiplusShutdown
GdipAlloc
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusStartup
msvcrt
free
atoi
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
strstr
memmove
strrchr
sprintf
_except_handler3
_local_unwind2
malloc
shlwapi
StrChrW
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ