Behavioral task
behavioral1
Sample
e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299.exe
Resource
win10v2004-20230621-en
General
-
Target
e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299
-
Size
600KB
-
MD5
bfa5bbc3c595a865809003d8f21eda18
-
SHA1
b34326be50288d492b1c97b310c496f022976451
-
SHA256
e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299
-
SHA512
f40995298af7ed6f80ea096634b45b8c84c8ce65f2442aa02bcc4cb84e76307daa5d634ded1514eeeaa1e5257d22385dc5fab7603d7c298d778f4015faa1b9e9
-
SSDEEP
12288:W6rpaGvJig6OC696XyXYbZBV/CvJk5CjU4tadKN3I2yV:TrpaGvJG0w/2JJ5JIP
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299
Files
-
e56df3349b81678caad492510d76703215a213e2d5321d8c08664c3af6fcd299.exe windows x86
0bf5cb97907fc2c78c8554cbcd9be8cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CertCreateCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChainEngine
CertFreeCertificateChain
CertFindExtension
CryptDecodeObjectEx
CryptQueryObject
CertAddCertificateContextToStore
CertEnumCertificatesInStore
CertOpenStore
CryptStringToBinaryW
CertCloseStore
CertFindCertificateInStore
PFXImportCertStore
CertFreeCertificateContext
kernel32
TlsGetValue
SetEnvironmentVariableA
CreateFileA
GetTickCount
VirtualFree
GetProcAddress
DeleteFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
OpenEventA
LCMapStringW
LCMapStringA
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetCurrentDirectoryA
GetProcessHeap
HeapAlloc
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
HeapFree
HeapCreate
HeapDestroy
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
DebugBreak
RaiseException
VirtualAlloc
LoadLibraryA
GetSystemInfo
VirtualProtect
FindFirstFileW
FindResourceExW
FindResourceW
LoadResource
WideCharToMultiByte
Sleep
SizeofResource
CreateEventA
MultiByteToWideChar
lstrlenW
CreateDirectoryA
GetLastError
FindClose
LockResource
GetModuleFileNameA
SetFilePointer
SystemTimeToFileTime
CreateDirectoryW
SetFileTime
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetCurrentDirectoryW
CloseHandle
LocalFileTimeToFileTime
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
GetSystemDirectoryW
LoadLibraryW
GetModuleHandleW
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentProcessId
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
FormatMessageW
SetLastError
GetEnvironmentVariableA
MoveFileExW
WaitForSingleObject
VerifyVersionInfoW
VerSetConditionMask
GetModuleHandleA
SleepEx
GetFileSizeEx
GlobalUnlock
lstrcmpW
GlobalLock
GetModuleFileNameW
EnumResourceLanguagesW
ConvertDefaultLocale
GetLocaleInfoW
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
InterlockedExchange
CompareStringA
GlobalFree
FreeResource
WritePrivateProfileStringW
GlobalAddAtomW
SetEvent
GetVersionExA
GlobalFindAtomW
GlobalGetAtomNameW
GetVersionExW
CompareStringW
GetFullPathNameW
MulDiv
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetErrorMode
LocalFree
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
ExitProcess
GetAtomNameW
lstrlenA
GetCurrentProcess
FlushFileBuffers
SetEndOfFile
FileTimeToSystemTime
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetFileInformationByHandle
GetDriveTypeW
CreateThread
ExitThread
GetTimeFormatA
GetDateFormatA
HeapValidate
IsBadReadPtr
RtlUnwind
GetDriveTypeA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowPos
IsWindow
GetDlgItem
SendDlgItemMessageW
IsDialogMessageW
SetWindowTextW
GetWindowTextW
GetDlgCtrlID
SetWindowLongW
ShowWindow
SetFocus
GetFocus
PostMessageW
IsIconic
UnregisterClassW
PtInRect
GetClipboardFormatNameW
GetClipboardFormatNameA
SystemParametersInfoW
ModifyMenuW
InsertMenuItemW
GetMenuItemInfoW
GetMenuState
GetMenuItemID
EnableMenuItem
CheckMenuItem
IsMenu
CreatePopupMenu
GrayStringW
DrawTextExW
DrawTextW
GetWindow
GetSysColorBrush
SetRectEmpty
FillRect
GetMenuItemCount
GetSubMenu
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
ReleaseCapture
TranslateAcceleratorW
LoadAcceleratorsW
RegisterWindowMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
SendDlgItemMessageA
GetSysColor
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
WinHelpW
TrackPopupMenu
GetClassLongW
GetClassNameW
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
SetMenu
GetMenu
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
SetCursor
GetKeyState
CallNextHookEx
PeekMessageW
GetCursorPos
SetWindowsHookExW
GetWindowRect
GetClientRect
MapWindowPoints
ClientToScreen
ScreenToClient
GetMessageW
TranslateMessage
DispatchMessageW
GetMenuCheckMarkDimensions
LoadBitmapW
SetMenuItemBitmaps
TabbedTextOutW
EndDialog
CreateDialogIndirectParamW
DestroyWindow
LoadIconW
LoadCursorW
GetForegroundWindow
SetForegroundWindow
MessageBoxW
GetWindowLongW
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowThreadProcessId
SendMessageW
RegisterClipboardFormatW
PostQuitMessage
wsprintfW
BeginPaint
BringWindowToTop
EndPaint
InflateRect
GetDC
GetWindowDC
ReleaseDC
UpdateWindow
InvalidateRect
ValidateRect
IsWindowVisible
ShowOwnedPopups
GetActiveWindow
SetActiveWindow
GetCapture
GetDesktopWindow
GetNextDlgTabItem
GetTopWindow
gdi32
Escape
GetTextExtentPoint32W
TextOutW
GetPixel
BitBlt
RectVisible
PtVisible
CreateFontIndirectW
CreatePatternBrush
CreateSolidBrush
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetObjectType
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
GetStockObject
DeleteDC
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ExtTextOutW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptDestroyKey
CryptEncrypt
CryptImportKey
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
OpenThreadToken
RevertToSelf
SetThreadToken
RegDeleteKeyW
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
RegSetValueExW
shell32
DragFinish
DragQueryFileW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
ioctlsocket
gethostname
getpeername
__WSAFDIsSet
select
connect
recv
WSAIoctl
setsockopt
getaddrinfo
freeaddrinfo
htonl
socket
listen
getsockname
accept
recvfrom
bind
sendto
htons
WSASetLastError
ntohs
WSACloseEvent
WSAEventSelect
WSAWaitForMultipleEvents
WSAResetEvent
getsockopt
WSACreateEvent
WSAStartup
WSACleanup
WSAGetLastError
send
closesocket
WSAEnumNetworkEvents
wldap32
ord117
ord14
ord219
ord145
ord208
ord26
ord133
ord147
ord127
ord142
ord79
ord167
ord301
ord27
ord41
ord46
ord216
ord73
Sections
.text Size: - Virtual size: 896KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 593KB - Virtual size: 593KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ