Behavioral task
behavioral1
Sample
40cf93f37281f373fe5935cbb4ea99f4fe9fb21eded0acc7a57a35c63e596dd6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40cf93f37281f373fe5935cbb4ea99f4fe9fb21eded0acc7a57a35c63e596dd6.exe
Resource
win10v2004-20221111-en
General
-
Target
40cf93f37281f373fe5935cbb4ea99f4fe9fb21eded0acc7a57a35c63e596dd6
-
Size
3.0MB
-
MD5
3436caf48e242bb5e72d060cd0c1ebb2
-
SHA1
b427314ec20c741928d2970d055ff48b7c682738
-
SHA256
40cf93f37281f373fe5935cbb4ea99f4fe9fb21eded0acc7a57a35c63e596dd6
-
SHA512
f0e5a7a9609d758c6797502641d3e10a79d1bc48c45b070169090a8ebf76924bd5f3fa06c9a10a1d18782b97a8cb08a0365927156a9d589dca1c44bf8095c70a
-
SSDEEP
98304:vTQrKN9zQqloKA302mZY25jP9+CV+ZpzBInUBQX6V:0ON9zQcoK72mZY2VbV+Z1B6Di
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
40cf93f37281f373fe5935cbb4ea99f4fe9fb21eded0acc7a57a35c63e596dd6.exe windows x86
9a1955ca07aefdab01a48ff05a5796f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
GlobalAddAtomA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
KillTimer
gdi32
BitBlt
winmm
waveOutOpen
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
ImageList_Destroy
ws2_32
recvfrom
wininet
HttpSendRequestA
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 645KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 461KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE