Behavioral task
behavioral1
Sample
47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db.exe
Resource
win10v2004-20230703-en
General
-
Target
47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db
-
Size
8.3MB
-
MD5
a1ff75d15c200dec55fe3ce1072e7ce8
-
SHA1
b173ca896304526fe72c7d40ddc6df91e5269e74
-
SHA256
47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db
-
SHA512
dfaca7badef9c37c5b3bfee1cf666d314fae3e2da41b135b8d18ee1def767df010900645351c7772ce8b6f148372b4cffb81084bef76313bb66f193c40a4b67b
-
SSDEEP
196608:hO4uDNT1Ek703RbGzamfqJSQj7Tgqwhqsg:hOHDLx03RU5fCsqX
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db
Files
-
47e88dc82e8c53464c3323e27bbdfb0b93db383c0d745746edf3116fc91645db.exe windows x86
06bbfd28ec16a5b4d4a47cfa4adefdca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
DestroyCursor
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
SetMapperFlags
advapi32
RegQueryValueA
shell32
ShellExecuteExA
ole32
RegisterDragDrop
msimg32
AlphaBlend
comctl32
_TrackMouseEvent
shlwapi
PathFindFileNameA
uxtheme
CloseThemeData
oledlg
ord8
urlmon
URLDownloadToFileA
gdiplus
GdipDisposeImage
winmm
PlaySoundA
wininet
FtpGetFileA
ws2_32
WSAGetLastError
oleacc
LresultFromObject
imm32
ImmReleaseContext
winspool.drv
DocumentPropertiesA
oleaut32
VarBstrFromDec
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 601KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 8.3MB - Virtual size: 8.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ