Behavioral task
behavioral1
Sample
#~(34$eyqII9V5Y+}{+$.exe
Resource
win10v2004-20220812-en
General
-
Target
#~(34$eyqII9V5Y+}{+$.exe
-
Size
1008KB
-
MD5
e8659247d28fd7d544cc199033326e73
-
SHA1
dcd551a8617835b5dabc03c83e7709d6bba2670c
-
SHA256
1564919543f2198637816429f40ef8e829860063588859fce4ed002761205308
-
SHA512
e4b6aaee51301a0d5465629236543891bcabff1eb7bd05537cc0b400b801bc2730db5b9e7c1d4163613aeef7ccf67fc835741642b627e2b1ad28b769d85ac988
-
SSDEEP
24576:2jLRKkP4WChDxuk4JBJ/6ERHywedip4R4IDU5nmVz1W:2jLR3PvKEkoBRRRHyweds4RxU5nmVz1W
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
#~(34$eyqII9V5Y+}{+$.exe.exe windows x86
e60605ea9af9282ac9e77c0b335cc525
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
shell32
Shell_NotifyIconA
msvcp100
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
psapi
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
wininet
DeleteUrlCacheEntryA
msvcr100
strrchr
Sections
.text Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 753KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 863KB - Virtual size: 863KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ