Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
4.7MB
-
MD5
94be31f46961d69d0d74a05dd31d0a94
-
SHA1
d32c67934ea78411a65c1ad298e5613914583a03
-
SHA256
156c5ddbfeaeb8699d9b3c6d41c0e2e7082a178b1d436ba0a5e54e05a675cbd0
-
SHA512
94a89ef23b74aa36d5d9825bb42c8ebd5a224fa91efed08f8fbda0344186fa969246ee3fc39e4f243022b8533af6272415572621d92d98928f7803dc05626d67
-
SSDEEP
98304:406tTZ4VKa1c9pNNRk90/jnKz+CHKR0kpfkC0Ri//7B:4VtXasnNRq0/jEHWHnF
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
file.exe.exe windows x86
f02e2ed6dd0446a675987edb746d2999
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetTempPathA
GetModuleHandleExA
GetTimeZoneInformation
CopyFileA
GetLastError
GetFileAttributesA
TzSpecificLocalTimeToSystemTime
CreateFileA
LoadLibraryA
GetVersionExA
LockResource
DeleteFileA
Process32Next
CloseHandle
GetSystemInfo
CreateThread
GetWindowsDirectoryA
LoadResource
SetFileAttributesA
GetLocalTime
GetProcAddress
LocalFree
RemoveDirectoryA
GetCurrentProcessId
GlobalMemoryStatusEx
FreeLibrary
WideCharToMultiByte
CreateDirectoryA
GetSystemTime
GetPrivateProfileStringA
IsWow64Process
GetComputerNameA
lstrcatA
lstrcpyA
HeapFree
HeapAlloc
lstrcpynA
GetProcessHeap
ReadFile
SetFilePointer
CreateFileW
GetLocaleInfoA
TryEnterCriticalSection
FindClose
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
GetFileAttributesW
UnmapViewOfFile
HeapValidate
HeapSize
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
WaitForSingleObjectEx
DeleteFileW
HeapReAlloc
LoadLibraryW
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
GetFileSize
DeleteCriticalSection
SystemTimeToFileTime
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetModuleFileNameA
SetStdHandle
GetModuleHandleA
GetCurrentThreadId
LocalAlloc
WaitForSingleObject
AreFileApisANSI
GetVolumeInformationA
lstrlenA
FindResourceA
FindNextFileA
GetUserDefaultLocaleName
TerminateProcess
WriteFile
GetCurrentProcess
FindFirstFileA
Process32First
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetPrivateProfileSectionNamesA
SizeofResource
HeapCreate
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileSizeEx
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetStdHandle
GetModuleFileNameW
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
FindFirstFileExW
FindNextFileW
GetFinalPathNameByHandleW
SetFilePointerEx
GetFileInformationByHandleEx
LCMapStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
ExitProcess
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetDesktopWindow
wsprintfA
GetSystemMetrics
GetDC
GetWindowRect
EnumDisplayDevicesA
CharNextA
ReleaseDC
GetKeyboardLayoutList
GetProcessWindowStation
GetUserObjectInformationW
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
SystemFunction036
RegOpenKeyExA
GetUserNameA
CredFree
RegCloseKey
GetCurrentHwProfileA
RegQueryValueExA
CredEnumerateA
RegEnumKeyExA
shell32
SHGetFolderPathA
ShellExecuteA
crypt32
CryptUnprotectData
CryptStringToBinaryA
gdiplus
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipSaveImageToFile
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ