f�U]�DL�����+k)3��u)�[ax:1t�S�B��(m��w�Z������AҢ����E�Q��쟦� "�:NZ��W�`�<�XZ3ۤ�����<8��đ�,�T5v���LPW�oD��?ϫ���(Ý5�����y�x� �Bx�8�ub��{��e'����)G��q�!�8:�������cn�JF]�$���斳�����5��J�� �g��l�N���tB��h�/Z�$G!F.雛��2�148������#�(?��y�hN�Oh0�f��_�Uk�O���5��u@P���LK���"2���d�8`���~b�Q�\�v�%n 7��!qjpu�����R���56Y��]��t��Y��t���V�Z��DU���'b��u>(G�����$I.�� 54l��L�nyK�?�a���ϭ��.:9U�̄�vf�����m���]��.H���������ت�U��7��?#�I{6��'�����4]�YX[l⓲7 O��Q�̯!��Ƭ�[��[��7L��դ�����G�*�W���MS��y:$n/��NA^N���c�c��r�-rH�x/R�;d<��V��CG5��eM_�1▣��� Tx����[p�@�؎�2���!>>r�Lҍ�~��;",�*}휞�Wp��P#������1/����F��w�u� ���Ξ4fy�Q�M����"4`]{�Ʒ�-��~ ��l�,bK����u�7dP{�s��l�,�g��JK�5��i7�����i ^)a�;�¿�5\���f�弅?���ӌ>Q��W�b�> ]O���i5�P�e��L�E@h��s:���:���f�n� �GK����ھk��a&��u�}�q~,�q���I��Ev\Db�X0��_���)n���VD.)s��ԤS��Ku�[� /�������v�vy��\ZT��*��O�v�� k/���/:�ެ6^�p���� ���曱�Cp"�f�wsudxv/�2�tw�n�,��m�K��oXB�q�X:ԃ�hȘ;��<��r5A Bs�ck�:=����J=�Y]3Q~9���E�E��N��.5�������� k�����gDV"���b�Q���,j)���H�A6��M�^D��p�g<�Z#�Nʘ�|'�3�Ba��P����^��Y�'��D�<PgfoY��H���GƠI�2�����ӓҐJQ����iD�vJ>�*��ߊ�M��u�"����w/�c%�r>������.�u����}j�����y-�ϟ,��Vi���o髌̝?��U_Ԯ����ky5\�s*��*D�J�ZY�D���s���Ψ2�7��٣0E���U�x�x�f*«�_�#C�y�Zb���Q�o�Ї��rݷ��j�����0���hأ�(��pY#vy�kS?������B @ �� �D^�������9�ٝm�E�k0N�� ۯ����"҄�A ���ˑ�$lL���`L@�R&�5����@��Y��1M�ў.�8l� �SSQH/ᒅ*� ]��~���8x)���(�I��U���+f�n �?��q��|����5�9�P֨�%�k�p������Ϯmv40����&�� $�b��?�)<G�K��I�]��D=�0�@,ݒ�@��N��ӖU90�5����g.�x���:N������X���?��r��7^`��{.�YcxX��30�%�U ! u��o�G�q-�v���s�s��x�.2Ju�c�6��ہx}K�{�f����H��J,�1!u��P�=L?�mw�ķ<1��<s]�O�'{d�����!�dj!͐��麸g� }X� ��p#t��H+�t��+�"���M6s��k!v1�W֥$,���)��!�{hO8�b5�O �h�:�U橗���Me; ���4�ɼ�h ϙ����6��!��ëxt�j-���]S�D�_Y������8謒vܼ��^x�V�.K@Yky]�.k�!�Du���JC�U�4N������p!�8KǜQ�>�sȵ���N�v�ܤ�p�1y�}Ms�Ն}@{<�iǕ���K�9�}[V�$$�(��F��1K��F�� U���!�>|�⩨�ܷ0T�xۢ��Q�d��19�Vt�{T�����$X���z�V/ȋȦ��v���'��.�ڣ��UG�)n-�t�p�d�[�!}�W|sC�r1{��bsHa����3�I�B����3�~e�(Qu��W�t����:�>�����Ɔ���UQ�T���o&�%���ӡ�8Z���ތ�Nsx�ߺF$O���ASZ�f��ő��_���\���~z�?_q��Μ���,c�1�N��Y\j��\\S�'�Y|Q�Mq�?��V��C|��E�9�חA'C���kMW�"β�s�my�݄h4�pF�Uv�I�H8�ZU닺(�d��jb~+�>���)M�<��gg�ʍ���x���I�Sz'.�ď�(z�ԟ���b�Sxj���@Se���tn�@����ަ �^}�$x��H � �������y��@�9�&�2�4Z�.��GG�����z;������C���-;qGU֚�Y��������-\��KHb%�D]0�Jy3�g"����s�a��%�f���Gd�c�L�|���O/�����Tu˦�Ĵ�%6rt��W�7�!��>GaAF�>�J*C:N�op���w0Xc�O��nR`G@-c���������H)܀�6�I+�K�)���C�U������g��؟�c8F��W*e>c\Z��!�3L."�U3�6�ѝ;���BV�0a_��ɱ��5�S�n\�W��N��W���~bVK��f?��u%f����:W0m��C㈳�c��Of��Uץ�0q�$�r��t?3��_BJ%�j��8�A ]��q;�I]���}��0+b������|F�����j��f���8w��r s������ݩ�0���5��Wh�Z�b�;yF?�oh��g&�AH-��Y����2�q�j��,3&ƍ@R�$D�����+���MMYZw�d�v�qg��4&X�U+�
Behavioral task
behavioral1
Sample
c4cecb10c47a9db21ffca83234111b24d13cb51ab5112c941d1332c6e5c81e92.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4cecb10c47a9db21ffca83234111b24d13cb51ab5112c941d1332c6e5c81e92.exe
Resource
win10v2004-20221111-en
General
-
Target
c4cecb10c47a9db21ffca83234111b24d13cb51ab5112c941d1332c6e5c81e92
-
Size
4.0MB
-
MD5
3f04edb2408d8b887e920e8ce4a4d867
-
SHA1
bbbfb0f0067c91669e9053119045ae7e0ad0d43b
-
SHA256
c4cecb10c47a9db21ffca83234111b24d13cb51ab5112c941d1332c6e5c81e92
-
SHA512
1449f237e1987f4a5affe71c23b7aabe08bdbd2fd2be18f62ddb0033a18429052a050d431acef13eb24d3eda9d43cf8b025bea7896d15c5eb3904bda192f2e21
-
SSDEEP
98304:km+Q363tPowYUfiCpgxXpIComFdRlpWQV:kaMpYcbpg8ComFO
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
c4cecb10c47a9db21ffca83234111b24d13cb51ab5112c941d1332c6e5c81e92.exe windows x86
9f62859cb3e6d07c71d04d7497872070
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
Sleep
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GlobalFlags
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleHandleA
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
FreeLibrary
InterlockedDecrement
GetCurrentProcessId
SetLastError
MultiByteToWideChar
ExitProcess
GetPrivateProfileIntW
GetPrivateProfileStringW
WideCharToMultiByte
DeleteFileW
GetLastError
CreateMutexW
FreeResource
WriteFile
CreateFileW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleFileNameW
WaitForSingleObject
GetProcAddress
LoadLibraryW
GetModuleHandleW
CreateThread
ReadProcessMemory
CloseHandle
VirtualQueryEx
GetStartupInfoA
OpenProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
RegisterClipboardFormatW
PostThreadMessageW
GetSysColorBrush
UnregisterClassW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DestroyMenu
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
GetMessageW
TranslateMessage
GetActiveWindow
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
SetFocus
GetWindowTextLengthW
GetForegroundWindow
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
UpdateWindow
CreateWindowExW
GetClassInfoExW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetWindowRect
CharUpperW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
GetMenuState
InvalidateRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
RegisterWindowMessageW
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
InsertMenuW
CreatePopupMenu
GetWindowTextW
IsWindowVisible
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
EnumWindows
SetClassLongW
AppendMenuW
GetSystemMenu
SetWindowPos
SetForegroundWindow
ShowWindow
GetClassNameW
GetClassInfoW
WindowFromPoint
GetCursorPos
ReleaseCapture
SendMessageW
LoadIconW
SetCursor
LoadCursorW
SetCapture
EnableWindow
PostMessageW
GetWindowThreadProcessId
DispatchMessageW
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetWindowExtEx
GetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
GetBkColor
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutW
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
PtVisible
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
UrlUnescapeW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
SysStringLen
urlmon
URLDownloadToFileW
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetOpenUrlW
Exports
Exports
Sections
.text Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ