Behavioral task
behavioral1
Sample
98e124b850de83de8f608ff48f1cec04a0cd9fd445b28da138307883868a98eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
98e124b850de83de8f608ff48f1cec04a0cd9fd445b28da138307883868a98eb.exe
Resource
win10v2004-20220901-en
General
-
Target
98e124b850de83de8f608ff48f1cec04a0cd9fd445b28da138307883868a98eb
-
Size
56KB
-
MD5
fcf15a9c529bc3422c354f53573663e0
-
SHA1
abacd43b59030eeb93ce493a15578cee7fac4d89
-
SHA256
98e124b850de83de8f608ff48f1cec04a0cd9fd445b28da138307883868a98eb
-
SHA512
b327b0851a5625ad2607eed4754bf1f103e2a682014deba61a687e5c263c8e8459a7b0d65516e55af1c53e61fbf5ec758f5d1d11d97e980966b91c055d3c1413
-
SSDEEP
1536:NaNQP7dYmJzNphSXnCRahm7r8/HyAkPsDM:NaNQxzJSXnHhGwES
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
98e124b850de83de8f608ff48f1cec04a0cd9fd445b28da138307883868a98eb.exe windows x86
800f8b6eea1ed260cfa936f01f557769
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord518
ord593
ord594
ord595
ord598
ord631
EVENT_SINK_AddRef
ord529
ord561
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord715
ProcCallEngine
ord645
ord571
ord685
ord100
ord617
kernel32
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
Sections
.text Size: - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ