Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
3.5MB
-
MD5
6a132fec0229a82f641efd9f2b489348
-
SHA1
e54f7f270f155e813adcb1adbbd8b0d310c790d5
-
SHA256
91b5dd1d3b3389471526471e7bbd23f70c9a94ce73733e21b8c7f99a6b3a6d1d
-
SHA512
428438a50d4d937e5e4cb0118882c1ad8c979ee838a8220c4e2f74ed902113478f75c1c1c1db8702f3cb76c88a9cdc08bda40670d15b62d37b7fd4efe282045c
-
SSDEEP
49152:dJTO65WNj2rPLwdimBGEFcGvC+ox09wQ3sx9axS/k+XQlPWR9KuaDCXq1j9aRL2W:/S6rUgQBcVlcwQcxsxScS/TQYCIplP
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
file.exe.exe windows x64
245fbb05d3da4d7c6badd5cc3e1f9b98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadFile
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
winhttp
WinHttpSetOption
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 937KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ