Behavioral task
behavioral1
Sample
d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83.exe
Resource
win10v2004-20230703-en
General
-
Target
d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83
-
Size
5.2MB
-
MD5
94d6a2dc9907114e20b7b7e19c7c6c6c
-
SHA1
e2b4a0f548a85c4ce3d6cda8f1d5856dd5c4f314
-
SHA256
d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83
-
SHA512
cf5ad7eafcd96c6dbe0e6f038b21fbfd8f731153c6145f179a5a83049beb53b231400553578391fdb51acc18386c5db8fc959edbf72b5b2f6dd6a9f56e4c638d
-
SSDEEP
98304:IFuuweoP7C1tZB8WXaRWzRGp+00BYJFhS5MZjkZa/7Fhr5/KFKf32e:DuRo7SBVDcplA8Fhfx/fnf3l
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83
Files
-
d6bb4567ed4968cb907419131b3a36ad9af3185eaf7784efb3777093911cad83.exe windows x86
4ccb46c96a315a29eb186bf22c794244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
shlwapi
PathIsDirectoryW
ws2_32
select
user32
FindWindowExA
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetClipBox
advapi32
RegCreateKeyExA
shell32
CommandLineToArgvW
ole32
OleIsCurrentClipboard
wininet
InternetOpenA
winhttp
WinHttpOpen
rasapi32
RasHangUpA
oledlg
ord8
oleaut32
VariantInit
winspool.drv
ClosePrinter
comctl32
ord17
Sections
.text Size: - Virtual size: 698KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 455B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE