Behavioral task
behavioral1
Sample
6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f.exe
Resource
win10v2004-20230703-en
General
-
Target
6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f.exe
-
Size
1.8MB
-
MD5
9a74b4be9425a3d3b5b40d55d21601c3
-
SHA1
f29046f9c4096fea340c488d36307f581f899ae7
-
SHA256
6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f
-
SHA512
23792cc381b07502e7bc3add8bb8f9c0fc5e59f515918e737bca14ed455c69e7045ec1a98dcaa86e4973ad3574eb7566d93d85d6965e4e2773a2f02b1f9ff38c
-
SSDEEP
49152:SdGPUmiLrPw/IyJyWN95PUi88iOYHFR9k67CYkSYkp:SYEnYrRb4FRDC7S7p
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f.exe
Files
-
6a0df27f8a774bbe0b19414be601e977c25c36e501e74dab9d21c3158034052f.exe.exe windows x86
6c637586c8988f74d649e5d5735d090f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CertFindExtension
CryptDecodeObjectEx
CryptQueryObject
CertAddCertificateContextToStore
CertCreateCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChainEngine
CertFreeCertificateChain
CertEnumCertificatesInStore
PFXImportCertStore
CertFindCertificateInStore
CertCloseStore
CertOpenStore
CryptStringToBinaryW
CertFreeCertificateContext
kernel32
TlsGetValue
GetDriveTypeA
SetEnvironmentVariableA
CreateFileA
GetTickCount
VirtualFree
GetProcAddress
DeleteFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
OpenEventA
LCMapStringW
LCMapStringA
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetCurrentDirectoryA
GetProcessHeap
HeapAlloc
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
HeapFree
HeapCreate
HeapDestroy
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
OutputDebugStringA
DebugBreak
VirtualQuery
RaiseException
ExitProcess
VirtualAlloc
LoadLibraryA
GetSystemInfo
VirtualProtect
FindFirstFileW
FindResourceExW
FindResourceW
LoadResource
WideCharToMultiByte
Sleep
SizeofResource
CreateEventA
MultiByteToWideChar
lstrlenW
CreateDirectoryA
GetLastError
FindClose
LockResource
GetModuleFileNameA
SetFilePointer
SystemTimeToFileTime
CreateDirectoryW
SetFileTime
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetCurrentDirectoryW
CloseHandle
LocalFileTimeToFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
QueryPerformanceFrequency
FreeLibrary
GetSystemDirectoryW
LoadLibraryW
GetModuleHandleW
QueryPerformanceCounter
MoveFileExW
GetEnvironmentVariableA
SetLastError
FormatMessageW
GetCurrentProcessId
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
WaitForSingleObject
VerifyVersionInfoW
VerSetConditionMask
GetModuleHandleA
SleepEx
GetFileSizeEx
GlobalUnlock
lstrcmpW
GlobalLock
GetModuleFileNameW
EnumResourceLanguagesW
ConvertDefaultLocale
GetLocaleInfoW
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
InterlockedExchange
CompareStringA
GlobalFree
FreeResource
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GlobalAddAtomW
SetEvent
GetVersionExA
GlobalFindAtomW
GlobalGetAtomNameW
GetVersionExW
CompareStringW
GetFileTime
GetTempFileNameW
GetFullPathNameW
GetDiskFreeSpaceW
MulDiv
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetErrorMode
LocalFree
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
RtlUnwind
GetThreadLocale
GetAtomNameW
lstrlenA
DuplicateHandle
GetCurrentProcess
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
MoveFileW
DeleteFileW
GetVolumeInformationW
GetStringTypeExW
lstrcmpiW
GetShortPathNameW
FileTimeToSystemTime
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
WriteConsoleW
FileTimeToLocalFileTime
GetDriveTypeW
GetFileInformationByHandle
CreateThread
ExitThread
GetTimeFormatA
GetDateFormatA
HeapValidate
IsBadReadPtr
LoadLibraryA
GetProcAddress
GetLastError
FreeLibrary
InitializeCriticalSection
GetModuleFileNameW
GetModuleHandleW
TerminateProcess
GetCurrentProcess
DeleteCriticalSection
LoadLibraryW
CreateEventW
CompareStringW
SetLastError
GetModuleHandleA
VirtualProtect
GetTickCount
EnterCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
WriteProcessMemory
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCurrentThreadId
Thread32First
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
GetSystemInfo
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindResourceExW
FindResourceExA
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetCommandLineA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
VirtualQuery
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowPos
MapDialogRect
IsWindow
GetDlgItem
SendDlgItemMessageW
SetDlgItemTextW
IsDialogMessageW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetDlgCtrlID
SetWindowLongW
MoveWindow
ShowWindow
SetFocus
GetFocus
PostMessageW
GetSystemMenu
IsIconic
IsZoomed
SetWindowRgn
UnregisterClassW
GetTabbedTextExtentA
IsRectEmpty
PtInRect
GetClipboardFormatNameW
GetClipboardFormatNameA
SystemParametersInfoW
DestroyIcon
CharUpperW
MessageBeep
CopyAcceleratorTableW
CharNextW
RemoveMenu
ModifyMenuW
InsertMenuItemW
InsertMenuW
GetMenuItemInfoW
GetMenuStringW
GetMenuState
GetMenuItemID
EnableMenuItem
CheckMenuItem
AppendMenuW
DeleteMenu
IsMenu
CreatePopupMenu
CreateMenu
GrayStringW
DrawTextExW
DrawTextW
DrawIcon
GetWindow
GetSysColorBrush
SetRectEmpty
FillRect
DestroyCursor
GetMenuItemCount
GetSubMenu
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
ReleaseCapture
TranslateAcceleratorW
LoadAcceleratorsW
RegisterWindowMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
SendDlgItemMessageA
GetSysColor
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
WinHelpW
TrackPopupMenu
GetClassLongW
GetClassNameW
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
SetMenu
GetMenu
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
SetCursor
GetKeyState
CallNextHookEx
PeekMessageW
GetCursorPos
SetWindowsHookExW
GetWindowRect
GetClientRect
MapWindowPoints
ClientToScreen
ScreenToClient
GetMessageW
TranslateMessage
DispatchMessageW
GetMenuCheckMarkDimensions
LoadBitmapW
SetMenuItemBitmaps
TabbedTextOutW
EndDialog
CreateDialogIndirectParamW
DestroyWindow
LoadIconW
LoadCursorW
PostThreadMessageW
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
GetForegroundWindow
SetForegroundWindow
SetWindowContextHelpId
MessageBoxW
GetWindowLongW
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowThreadProcessId
SendMessageW
RegisterClipboardFormatW
PostQuitMessage
wsprintfW
BeginPaint
BringWindowToTop
EndPaint
InflateRect
SetRect
GetDC
GetWindowDC
ReleaseDC
UpdateWindow
InvalidateRect
InvalidateRgn
ValidateRect
IsWindowVisible
ShowOwnedPopups
GetDCEx
LockWindowUpdate
SetTimer
KillTimer
GetActiveWindow
SetActiveWindow
GetCapture
SetCapture
GetDesktopWindow
GetNextDlgGroupItem
GetNextDlgTabItem
ShowScrollBar
GetTopWindow
IsChild
SetParent
WindowFromPoint
MessageBoxW
CharUpperBuffW
gdi32
GetTextExtentPoint32A
GetTextExtentPointW
EndDoc
AbortDoc
SetAbortProc
EndPage
StartPage
StartDocW
Escape
GetTextMetricsW
GetTextFaceW
GetTextAlign
GetTextExtentPoint32W
TextOutW
GetPixel
BitBlt
PatBlt
Rectangle
Ellipse
RectVisible
PtVisible
LPtoDP
DPtoLP
GetWindowExtEx
GetWindowOrgEx
GetViewportExtEx
GetViewportOrgEx
GetMapMode
GetTextColor
GetStretchBltMode
GetROP2
GetPolyFillMode
GetBkMode
GetBkColor
GetNearestColor
GetRgnBox
CombineRgn
SetRectRgn
CreateEllipticRgn
CreateRectRgnIndirect
CreateFontIndirectW
CreatePatternBrush
CreateSolidBrush
CreatePen
GetDeviceCaps
ExtSelectClipRgn
CreateRectRgn
GetCurrentPositionEx
SetTextAlign
LineTo
MoveToEx
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
GetObjectType
CreateFontW
GetCharWidthW
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchDIBits
GetStockObject
DeleteDC
CreateDCW
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ExtTextOutW
comdlg32
GetFileTitleW
winspool.drv
GetJobW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
GetFileSecurityW
RegDeleteValueW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
CryptGenRandom
CryptDestroyKey
CryptEncrypt
CryptImportKey
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
OpenThreadToken
RevertToSelf
SetThreadToken
RegDeleteKeyW
RegQueryValueW
RegCreateKeyW
RegSetValueW
RegEnumKeyW
SetFileSecurityW
RegOpenKeyW
RegSetValueExW
shell32
DragFinish
DragQueryFileW
SHGetFileInfoW
ExtractIconW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
PathRemoveFileSpecW
oledlg
OleUIBusyW
ole32
StringFromCLSID
CoTaskMemAlloc
CoRegisterMessageFilter
CoGetClassObject
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
StringFromGUID2
CoCreateInstance
CoInitializeEx
CoUninitialize
OleTranslateAccelerator
IsAccelerator
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
ws2_32
ioctlsocket
gethostname
select
__WSAFDIsSet
getpeername
connect
recv
getaddrinfo
freeaddrinfo
htonl
WSAIoctl
setsockopt
accept
getsockname
listen
recvfrom
sendto
bind
htons
socket
WSASetLastError
ntohs
WSACloseEvent
WSASetEvent
getsockopt
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSAResetEvent
WSACreateEvent
WSAStartup
WSACleanup
WSAGetLastError
send
closesocket
WSAEventSelect
wldap32
ord73
ord216
ord117
ord14
ord219
ord145
ord208
ord26
ord27
ord133
ord147
ord127
ord167
ord301
ord142
ord79
ord41
ord46
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 590KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 563KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ