Behavioral task
behavioral1
Sample
c7a441c3ef9d38cd1255950da2614237c88d7c71d5beecd83afc74a88f437083.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7a441c3ef9d38cd1255950da2614237c88d7c71d5beecd83afc74a88f437083.dll
Resource
win10v2004-20220812-en
General
-
Target
c7a441c3ef9d38cd1255950da2614237c88d7c71d5beecd83afc74a88f437083
-
Size
508KB
-
MD5
acc9ced820c5d382a73370e0d44146fb
-
SHA1
f73317e820fadcced9b1245e671ecfe2a5402996
-
SHA256
c7a441c3ef9d38cd1255950da2614237c88d7c71d5beecd83afc74a88f437083
-
SHA512
5a967cdf43a55ca6b57b77bc32a18b784c3fb4f4d13dc1bc19fb28acad5862a14b8ab5cd2122b99bf192b6614d16eefa6443d5426db6cb0aed57bc4a14827be8
-
SSDEEP
12288:GSsE2KT8qY3NhaMUReNSvprK/xAymHDNvQoYI3z:TMtfdh8RqSwxAyaOodz
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
c7a441c3ef9d38cd1255950da2614237c88d7c71d5beecd83afc74a88f437083.dll windows x86
0a9a9bfa0fb12810cdd9ced576854018
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
send
closesocket
WSAStartup
socket
htons
connect
recv
gethostbyname
kernel32
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
HeapReAlloc
HeapFree
GetCommandLineA
RaiseException
ExitProcess
TerminateProcess
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GetLastError
SetLastError
GlobalFlags
MulDiv
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
CloseHandle
MultiByteToWideChar
GlobalAlloc
lstrcmpA
GetCurrentThread
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
InterlockedDecrement
InterlockedIncrement
LocalFree
WideCharToMultiByte
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcpynA
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateThread
WriteProcessMemory
OpenProcess
GetTempPathA
GetPrivateProfileStringA
ReadProcessMemory
user32
GetClientRect
AdjustWindowRectEx
SetFocus
GetFocus
DispatchMessageA
PeekMessageA
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
LoadIconA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
UnregisterClassA
GetClassNameA
PtInRect
ClientToScreen
ReleaseDC
GetDC
DrawTextA
GrayStringA
LoadStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
IsWindowVisible
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
CopyRect
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
TabbedTextOutA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
wsprintfA
EnableWindow
UnregisterHotKey
RegisterHotKey
SetTimer
KillTimer
SendMessageA
MessageBoxA
GetWindow
RemovePropA
gdi32
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteObject
SelectObject
GetDeviceCaps
GetStockObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
comctl32
ord17
Sections
.text Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ