Behavioral task
behavioral1
Sample
8e49c69c3f03c883b725cf54022fdf36bfc6053451edb72317beb0e3b679827e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e49c69c3f03c883b725cf54022fdf36bfc6053451edb72317beb0e3b679827e.exe
Resource
win10v2004-20220901-en
General
-
Target
8e49c69c3f03c883b725cf54022fdf36bfc6053451edb72317beb0e3b679827e
-
Size
140KB
-
MD5
9359abfefb8f337543f0ba7ac8de7b1c
-
SHA1
80186518cb2d016ffec7c6820dc9cf3995ecc6aa
-
SHA256
8e49c69c3f03c883b725cf54022fdf36bfc6053451edb72317beb0e3b679827e
-
SHA512
93d8bb085520fd03342722e0955592ee30ab8ca07c08c3ab668a9c24b094370484953928535bf1c6fe7177920a6fbca20483026cef7856cf630c7e28b549287e
-
SSDEEP
3072:SdqSwU8lL7afhNU+mKqIlpKdZiGmDaTL3ZZPoJQ:i8UNNMIlIdI6rPoJQ
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
8e49c69c3f03c883b725cf54022fdf36bfc6053451edb72317beb0e3b679827e.exe windows x86
a5e5aaff4d58cdf114daffda5e1f41d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord825
msvcrt
exit
kernel32
LoadLibraryA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetClassNameA
comdlg32
GetFileTitleA
advapi32
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
oleaut32
SysFreeString
ws2_32
closesocket
iphlpapi
GetAdaptersInfo
oleacc
ObjectFromLresult
winmm
mixerGetLineInfoA
wininet
InternetOpenA
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE