Behavioral task
behavioral1
Sample
90cf5fc775266c2825596b794d6887510291671fa38ec3711440c9ca1200cbfb.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
90cf5fc775266c2825596b794d6887510291671fa38ec3711440c9ca1200cbfb.dll
Resource
win10v2004-20221111-en
General
-
Target
90cf5fc775266c2825596b794d6887510291671fa38ec3711440c9ca1200cbfb
-
Size
708KB
-
MD5
8eb042905fa5ff07aa923b1ed6aa68b6
-
SHA1
f0e53302586cc85af821ca3febd7877f7bc4a404
-
SHA256
90cf5fc775266c2825596b794d6887510291671fa38ec3711440c9ca1200cbfb
-
SHA512
75ab2ca881f9bec08adfda4d06b8af8933b58e91cfeb0c3237badae915a0ddb7e9e2748b59dd56143ace2560725dd6fbfda966f518a139d5a443b2570ec07800
-
SSDEEP
12288:fJsjZTRj+lbFl+672zjCBfmjfKPBiKjNsemXHL7QiWoKD93ojUrJSos:fJsjZTRalb/n70GMObmPQRpVojUrc
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
90cf5fc775266c2825596b794d6887510291671fa38ec3711440c9ca1200cbfb.dll windows x86
a1269b5babd6a5c4b540a4cb88614661
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
send
closesocket
WSAStartup
socket
htons
connect
recv
gethostbyname
kernel32
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
HeapReAlloc
HeapFree
GetCommandLineA
RaiseException
ExitProcess
TerminateProcess
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
MultiByteToWideChar
GetOEMCP
GetCPInfo
GetProcessVersion
GetLastError
SetLastError
GlobalFlags
MulDiv
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
Sleep
CloseHandle
GlobalAlloc
lstrcmpA
GetCurrentThread
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
InterlockedDecrement
InterlockedIncrement
LocalFree
WideCharToMultiByte
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcpynA
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateThread
WriteProcessMemory
OpenProcess
GetTempPathA
GetPrivateProfileStringA
ReadProcessMemory
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetClientRect
AdjustWindowRectEx
SetFocus
GetFocus
DispatchMessageA
PeekMessageA
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
LoadIconA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
UnregisterClassA
GetClassNameA
PtInRect
ClientToScreen
ReleaseDC
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
CopyRect
IsWindowVisible
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
wsprintfA
EnableWindow
UnregisterHotKey
RegisterHotKey
SetTimer
KillTimer
SendMessageA
MessageBoxA
GetForegroundWindow
RegisterWindowMessageA
gdi32
CreateBitmap
DeleteObject
SelectObject
GetDeviceCaps
GetStockObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetBkColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetTextColor
GetClipBox
GetObjectA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
Sections
.text Size: - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 696KB - Virtual size: 695KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ