Behavioral task
behavioral1
Sample
aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f.exe
Resource
win10v2004-20230703-en
General
-
Target
aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f
-
Size
8.0MB
-
MD5
2b00385df96f485e0547a53d4af4f646
-
SHA1
1344422bc897e492bce22b174d9c02267080c50d
-
SHA256
aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f
-
SHA512
e4b2918a89629a1f4b9efe52db5bbf572915fd9fb48cbe2d943fd7e577d55ebf36277b47d395cebdd00fc0dcc07d6278a1acda388271d523fe86acaf887fe6fc
-
SSDEEP
196608:9yn9Q6Qfx86hAq7jDNhWVz36YJVRiFXwJ:9S9Q6sx8CfDNhWJ36Yt/J
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f
Files
-
aa936d701aa1a23d2802e49e2687dbedd02b4ffa41c929ac8be282f673e8377f.exe windows x86
f5151e63f951542420f03e2fa50c82d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamOut
ws2_32
socket
rasapi32
RasGetConnectStatusA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetScrollRange
CharUpperBuffW
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
oleaut32
VariantChangeType
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 7.9MB - Virtual size: 7.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 420KB - Virtual size: 419KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ