Behavioral task
behavioral1
Sample
544b3d51d13c9fd84f0994e3d003b509dc7b4cc095cfe641252c9bded41a941f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
544b3d51d13c9fd84f0994e3d003b509dc7b4cc095cfe641252c9bded41a941f.dll
Resource
win10v2004-20220901-en
General
-
Target
544b3d51d13c9fd84f0994e3d003b509dc7b4cc095cfe641252c9bded41a941f
-
Size
104KB
-
MD5
b437db5f4ccba7d015a6fe6efee036d4
-
SHA1
16bfc4d112c0398724f1b6ee72571aa51f80d195
-
SHA256
544b3d51d13c9fd84f0994e3d003b509dc7b4cc095cfe641252c9bded41a941f
-
SHA512
8d4ab2d4baec62e4c6c5be67fa0fced90f3d2de7d68e98697a5993fa49fb55e5965c93c4c5f83207f155470fe1be68aced47b820723c9fb2314b0213166fbd04
-
SSDEEP
1536:s0taMO5cuvxTj0ioLohAmkx526YtORW7RP2BbM1eAyQ8vG01cRFFZrq:3PO5c0cCB052LtOYV2dM1WQd01KFFZr
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
544b3d51d13c9fd84f0994e3d003b509dc7b4cc095cfe641252c9bded41a941f.dll windows x86
f108d34a73a1968c24082d4e77264245
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualProtect
GetModuleHandleA
CreateThread
GetModuleFileNameW
CloseHandle
GetProcAddress
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
user32
PostMessageA
MapVirtualKeyA
CallWindowProcA
MessageBoxA
GetWindowLongA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
winmm
timeGetTime
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ