_???������3��D��
Behavioral task
behavioral1
Sample
a7550c0f5220ca785289a10efd41ee24daf9df5231f9a8cfc2f86b32512bd10c.dll
Resource
win7-20221111-en
General
-
Target
a7550c0f5220ca785289a10efd41ee24daf9df5231f9a8cfc2f86b32512bd10c
-
Size
345KB
-
MD5
3f8aded2d33e9d0c991ef94ed3c9a340
-
SHA1
475b56d4b068b896db65b8bb3aaf090e2b5ff101
-
SHA256
a7550c0f5220ca785289a10efd41ee24daf9df5231f9a8cfc2f86b32512bd10c
-
SHA512
12b54de281905cdc1069a75f31baee8bbf1c2152526ccd89105bb97fa8d408a436e1678c791755c254372d2803e13b53732978c476796ef728c24e709a7ae5da
-
SSDEEP
6144:229UZ0Lu0BulvezUlSSVWmAHtu2PUAdleUo7nOYIIVJLnt4Odp:nfB2lSIWm2oOeU1YIkJ7t4Odp
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a7550c0f5220ca785289a10efd41ee24daf9df5231f9a8cfc2f86b32512bd10c.dll windows x86
9eb19930bbe361b17de3d34bf3253635
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
WideCharToMultiByte
MultiByteToWideChar
CreateWaitableTimerA
SetWaitableTimer
Thread32First
Thread32Next
OpenThread
TerminateThread
ResumeThread
GetCurrentThreadId
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetFileAttributesA
GetPrivateProfileStringA
DeleteFileA
GetLocalTime
GetCommandLineA
CloseHandle
LCMapStringA
GetVersionExA
DeviceIoControl
CreateFileA
Module32First
CreateToolhelp32Snapshot
FreeLibrary
LoadLibraryExA
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
GetCurrentProcess
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
KillTimer
CallWindowProcA
SetWindowLongA
RegisterHotKey
UnregisterHotKey
MsgWaitForMultipleObjects
GetWindowTextA
SetTimer
GetClassNameA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
psapi
GetMappedFileNameA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ