ServiceMain
Behavioral task
behavioral1
Sample
7ec8512b421b6ab486d5cf33cc5e1439ea1b8daea17c9115763c446e444d5928.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7ec8512b421b6ab486d5cf33cc5e1439ea1b8daea17c9115763c446e444d5928.dll
Resource
win10v2004-20220812-en
General
-
Target
7ec8512b421b6ab486d5cf33cc5e1439ea1b8daea17c9115763c446e444d5928
-
Size
38KB
-
MD5
64f7c29d72462dfb40012e138d5e9680
-
SHA1
097bd125a49f5e247782724150fb8463e16baf82
-
SHA256
7ec8512b421b6ab486d5cf33cc5e1439ea1b8daea17c9115763c446e444d5928
-
SHA512
556fde364a923fe0ca50d69f582f3d4e7546d0d0fccfd00155ef524253dcc0769f88f381b6ee7040dec059108e15909ee1c7dfdd42cb6b590126df2c2df4a3df
-
SSDEEP
768:qjA88lPX9PXYjPXRckCMY24kkPWlINLkOlpK23e:mePtPIjPhcQB4kWW+93e
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
7ec8512b421b6ab486d5cf33cc5e1439ea1b8daea17c9115763c446e444d5928.dll windows x86
7b39805e5fefe28d88453756da6153ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
Sleep
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
DisableThreadLibraryCalls
CreateThread
FreeLibraryAndExitThread
ExitProcess
ReadFile
SetFilePointer
FreeLibrary
GetSystemDirectoryA
GetStartupInfoA
WaitForSingleObject
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
OpenProcess
MultiByteToWideChar
lstrcmpA
GetVersion
DeviceIoControl
GetCurrentProcessId
GetProcAddress
lstrcpyA
lstrcatA
lstrlenA
LoadLibraryA
CreateProcessA
user32
wsprintfA
CharUpperA
advapi32
RegOpenKeyExA
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegCloseKey
DeleteService
OpenSCManagerA
ControlService
wininet
InternetReadFile
HttpQueryInfoA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
ws2_32
inet_ntoa
gethostbyname
WSAStartup
inet_addr
shlwapi
SHDeleteKeyA
msvcrt
_adjust_fdiv
malloc
_initterm
free
_except_handler3
strstr
strchr
atoi
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
sprintf
??3@YAXPAX@Z
Exports
Exports
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.delete Size: 512B - Virtual size: 746B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pklstb Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 4KB - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ