Behavioral task
behavioral1
Sample
e910bd280867d5011b1517ad9b64ffa8c468078920b4cb989abc28d4eb353e10.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e910bd280867d5011b1517ad9b64ffa8c468078920b4cb989abc28d4eb353e10.exe
Resource
win10v2004-20221111-en
General
-
Target
e910bd280867d5011b1517ad9b64ffa8c468078920b4cb989abc28d4eb353e10
-
Size
129KB
-
MD5
2b1e2741d15d3a04240707cb51bf842f
-
SHA1
a50fca2f6642551016ed13e24bf39791f5701911
-
SHA256
e910bd280867d5011b1517ad9b64ffa8c468078920b4cb989abc28d4eb353e10
-
SHA512
6de3f5e424ab2bff5b8d1f4b4b1496418ca6796ccd4dae38f3ee42b722708bd66fd2830477be30ec1865a482cce5c1ecdc63622437c3184b7208bd7cf20460dd
-
SSDEEP
3072:pfQHZIH4c/iU9kvheQtc9iar/rYYxMW2oQ/+TTNgN8ROSD/0Jqt:WIH4cajt0dPYtKO8n/0Jqt
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
e910bd280867d5011b1517ad9b64ffa8c468078920b4cb989abc28d4eb353e10.exe windows x86
c1080ab31bba96f8691ee876a805a1ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
LoadResource
FindResourceA
WinExec
GetTempPathA
GlobalAlloc
GetProcAddress
GetModuleHandleA
HeapFree
ReadFile
CreateFileA
GetProcessHeap
GetFileInformationByHandle
GetSystemDirectoryA
DuplicateHandle
GetCurrentProcess
LoadLibraryA
LocalFree
IsBadReadPtr
GetVersionExA
SizeofResource
WriteFile
CloseHandle
HeapAlloc
FreeResource
ExitProcess
TerminateProcess
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
VirtualProtect
GetModuleFileNameA
ExitProcess
advapi32
GetUserNameA
SetEntriesInAclA
SetSecurityInfo
GetSecurityInfo
user32
MessageBoxA
Sections
.text Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ