Behavioral task
behavioral1
Sample
e04c3bcb069a9fa5af43f95ad83f732b2d49445ec5a926bb96052850ab3e7ae2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e04c3bcb069a9fa5af43f95ad83f732b2d49445ec5a926bb96052850ab3e7ae2.dll
Resource
win10v2004-20220812-en
General
-
Target
e04c3bcb069a9fa5af43f95ad83f732b2d49445ec5a926bb96052850ab3e7ae2
-
Size
32KB
-
MD5
c97400b5fd43ec5153aaeebcbd7a9e41
-
SHA1
14019b212dfdcb0c4ee85b30014efdba647d0921
-
SHA256
e04c3bcb069a9fa5af43f95ad83f732b2d49445ec5a926bb96052850ab3e7ae2
-
SHA512
3d6b42802b5ef82834273f537de124b0d802e02785e8148cd98796545a22198ad4c55ae8e8fc74e9061002a3ce43014a304dc86f1dd5f16ce4409dbefad9daa9
-
SSDEEP
768:lB5NIq8xVgEtABbkHXebOagbAzRzdzhhWRMlf:XIqktABYHXebOJgmRef
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
e04c3bcb069a9fa5af43f95ad83f732b2d49445ec5a926bb96052850ab3e7ae2.dll windows x86
116488f29aac8b0369516e03c22a0131
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strtol
strstr
_strlwr
__CxxFrameHandler
__dllonexit
_onexit
_mbsrchr
strrchr
wcstombs
strncmp
??1type_info@@UAE@XZ
_mbscmp
??2@YAPAXI@Z
??3@YAXPAX@Z
mfc42
ord354
ord6881
ord1074
ord5204
ord690
ord3229
ord389
ord2818
ord5186
ord939
ord941
ord858
ord5710
ord5683
ord4204
ord5442
ord1979
ord665
ord6657
ord5356
ord2393
ord1988
ord540
ord860
ord800
ord6467
ord1243
ord1176
ord537
ord1578
ord600
ord826
ord269
kernel32
ExitProcess
LocalAlloc
LocalFree
FindFirstFileA
FindClose
GetCurrentProcessId
TerminateProcess
GetPrivateProfileStringA
GetCommandLineA
Sleep
CreateThread
lstrcpyA
LoadLibraryA
GetProcAddress
GetWindowsDirectoryA
OpenProcess
WriteProcessMemory
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
user32
GetWindowTextA
ShowWindow
SetWindowTextA
wsprintfA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shlwapi
PathFileExistsA
StrCmpNIA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ