Behavioral task
behavioral1
Sample
3a5f89a84fec9365d8d8839a2f8d6669eb5b6a9d911ec34d25bc67cc09b18bef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a5f89a84fec9365d8d8839a2f8d6669eb5b6a9d911ec34d25bc67cc09b18bef.exe
Resource
win10v2004-20220812-en
General
-
Target
3a5f89a84fec9365d8d8839a2f8d6669eb5b6a9d911ec34d25bc67cc09b18bef
-
Size
752KB
-
MD5
4f7c47326d8bc3dc41d7f80a7639ded0
-
SHA1
241113389c3f7bdade46ab3b569c39379a360455
-
SHA256
3a5f89a84fec9365d8d8839a2f8d6669eb5b6a9d911ec34d25bc67cc09b18bef
-
SHA512
4408794cc47912753f90b2674bb14a4a8bb48723e6caccee25710516d6d1c1fe1f9505286056eae359a3ef1571356afd0288111dc0b374c5be265e744a0d84ac
-
SSDEEP
12288:McWSPCj5H/K59Mod2gaUB46D322lJakYFXUxvOwUIHymyhpkeWiO8FuETK9GvKaT:McWt/U9Mod2gaUBjNcuqIHyF3rO8FvTL
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
3a5f89a84fec9365d8d8839a2f8d6669eb5b6a9d911ec34d25bc67cc09b18bef.exe windows x86
33daa7688166af7528c7a31af1f720b4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
waveOutPrepareHeader
midiStreamRestart
ws2_32
WSAAsyncSelect
accept
getpeername
recv
ioctlsocket
recvfrom
closesocket
WSACleanup
inet_ntoa
kernel32
lstrlenA
LoadLibraryA
FreeLibrary
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
SetEvent
WaitForMultipleObjects
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
GetSystemDirectoryA
GetWindowsDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
CreateThread
CreateEventA
Sleep
ExpandEnvironmentStringsA
GlobalAlloc
GlobalLock
GlobalUnlock
GetTempPathA
FindFirstFileA
FindClose
MoveFileA
DeleteFileA
CopyFileA
SetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
MulDiv
GetTickCount
WaitForSingleObject
CloseHandle
LocalFree
lstrcatA
GetStartupInfoA
LocalAlloc
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
GetWindowRect
EqualRect
UpdateWindow
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
InflateRect
SetScrollPos
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
SetFocus
IsIconic
SetMenu
GetMenu
DefWindowProcA
GetClassInfoA
DeleteMenu
GetSystemMenu
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
LoadImageA
EnumDisplaySettingsA
ClientToScreen
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
DrawFocusRect
DrawEdge
DrawFrameControl
WindowFromPoint
TranslateMessage
SystemParametersInfoA
GetWindowThreadProcessId
FindWindowA
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetRect
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
PeekMessageA
IntersectRect
GetWindowLongA
MessageBoxA
gdi32
GetDeviceCaps
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetPixel
ExtCreateRegion
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
RoundRect
GetCurrentObject
DPtoLP
LPtoDP
Rectangle
Ellipse
CreateCompatibleDC
GetPixel
BitBlt
StartPage
StartDocA
DeleteDC
EndDoc
EndPage
CreateFontIndirectA
GetStockObject
CreateSolidBrush
CombineRgn
CreateRectRgn
FillRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreateBitmap
GetTextExtentPoint32A
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
OleUninitialize
CLSIDFromString
OleInitialize
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
mfc42
ord859
ord940
ord1110
ord1949
ord6389
ord2863
ord1232
ord1270
ord6467
ord6423
ord6142
ord3089
ord1175
ord4698
ord1651
ord2463
ord2867
ord2725
ord561
ord500
ord815
ord772
ord3738
ord4622
ord5714
ord5307
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord6581
ord1200
ord795
ord6119
ord6157
ord6086
ord2452
ord4754
ord4734
ord4758
ord4225
ord3571
ord1146
ord3297
ord3290
ord6008
ord4125
ord3303
ord924
ord922
ord4271
ord616
ord3582
ord4398
ord2578
ord2818
ord836
ord2827
ord5858
ord6140
ord654
ord341
ord2763
ord5265
ord4376
ord4998
ord6052
ord1775
ord5280
ord4425
ord3597
ord324
ord2302
ord4234
ord3092
ord4710
ord4853
ord3721
ord4224
ord536
ord3692
ord5782
ord5873
ord2713
ord2061
ord3754
ord3756
ord6129
ord6130
ord6021
ord472
ord5786
ord5769
ord1229
ord3848
ord5603
ord545
ord2866
ord1795
ord2645
ord2089
ord809
ord556
ord1088
ord2122
ord2513
ord293
ord5791
ord2753
ord4218
ord2023
ord2411
ord2754
ord2764
ord269
ord600
ord1578
ord1243
ord6194
ord6919
ord765
ord3698
ord609
ord3574
ord4396
ord2575
ord5787
ord5788
ord3693
ord5781
ord5875
ord6172
ord3706
ord818
ord3742
ord470
ord2971
ord755
ord5799
ord1176
ord4267
ord825
ord800
ord941
ord540
ord537
ord5933
ord3758
ord3408
ord3227
ord3054
ord3425
ord3880
ord932
ord936
ord3810
ord1567
ord665
ord1979
ord6385
ord5186
ord354
ord268
ord823
ord403
ord613
ord289
ord858
ord4129
ord2614
ord860
ord641
ord2514
ord926
ord2864
ord5981
ord4299
ord6880
ord3797
ord1576
ord535
ord3803
ord5890
ord2937
ord3663
ord3626
ord640
ord2414
ord2557
ord283
ord4200
ord2860
ord4133
ord4297
ord5785
ord1640
ord323
ord2859
ord2405
ord2915
ord6199
ord3499
ord2515
ord355
ord1168
ord3874
ord939
ord1099
ord5861
ord5608
ord5710
ord805
ord801
ord541
ord2917
ord2803
ord958
ord6312
ord4177
ord3318
ord6010
ord5773
ord2601
ord3180
ord3183
ord3176
ord3507
ord3614
ord826
ord2801
ord1259
ord5440
ord2740
ord6383
ord5442
ord786
ord603
ord2461
ord1969
ord273
ord519
ord703
ord1643
ord4284
ord4287
ord1641
ord5572
ord2642
ord6197
ord2152
ord5794
ord5789
ord6055
ord4078
ord1776
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord567
ord4275
ord3547
ord4123
ord3402
ord3610
ord3619
ord3573
ord656
ord2379
ord816
ord2714
ord562
ord6605
ord6453
ord6215
ord6143
ord1233
ord2454
msvcrt
malloc
free
strncpy
_mbsnbcmp
strstr
_mbsstr
strchr
strrchr
_mbsrchr
ldiv
_setmbcp
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
__dllonexit
_i64toa
memmove
_mbsicmp
_mbscmp
atoi
atof
__CxxFrameHandler
rand
getenv
srand
_ftol
strncmp
modf
_CIpow
_onexit
_controlfp
_atoi64
_setjmp3
longjmp
sscanf
_stricmp
_except_handler3
_memicmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
strtok
Sections
.text Size: - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 732KB - Virtual size: 729KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ