Behavioral task
behavioral1
Sample
ef4a2bb28bee4196a1996de11a3bbf8b.exe
Resource
win7-20230220-en
General
-
Target
ef4a2bb28bee4196a1996de11a3bbf8b.exe
-
Size
1.2MB
-
MD5
ef4a2bb28bee4196a1996de11a3bbf8b
-
SHA1
1a99d51ffa9419bf83c3a23b9d7332f4a598d53a
-
SHA256
870a43d88877a0a3e894c444742e29db08aa9c3ee11b8f355eda9c195cd00a4b
-
SHA512
e8c44f375a968e90425c9f2d02a59266fec972d677d3ae3d3d4521f7dbaffc3d694f1e3e7f99b67ebe62cd4c6a081df0422cb45a8ffb962ad9dfca63d9324dca
-
SSDEEP
12288:5zU3p48uWBJuktdYlf+TaSW9gzpCIAhgxqfcm/qEwU6nYYl7SRBd0OzW5lho:5zJMjJFaSWOzpNnPuBd0oW5n
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
ef4a2bb28bee4196a1996de11a3bbf8b.exe.exe windows x86
520e49367515fc0f38f619960f084b81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetVersion
OpenThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 374KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 614KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 704KB - Virtual size: 703KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ