Behavioral task
behavioral1
Sample
f58525eaa502fca29562c9f05486584dac024fa6b2ad8fba2b5d360c06abf019.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f58525eaa502fca29562c9f05486584dac024fa6b2ad8fba2b5d360c06abf019.exe
Resource
win10v2004-20230703-en
General
-
Target
119384ff7a2b5502994badc46ebd4ef5.bin
-
Size
5.5MB
-
MD5
0c38beca5eef1355b524f84887ac2e9a
-
SHA1
c5acbb7b25833ef4d23e3852706cde9b3b8c05d0
-
SHA256
22649a1bd5b7ce5d2bb1749e815c164be9880655b6691fb7604472773a1d774d
-
SHA512
791ff065a7ff5c8c3f4305f03fb5204f0ddeb4b7080114090cee7bc4424a3b6b241b24f85621a68475f83f0f19cd1754aa12dd9b8c14e490240372ad57ee271b
-
SSDEEP
98304:xEtCmUGCBWQr4C3bXaDIm2IZ6LuW007hIUJDUyyvuDFyg3DM9g:itwBFM+bXaDItIAiW0vUJ4yeCyg3w9g
Malware Config
Signatures
-
resource yara_rule static1/unpack001/f58525eaa502fca29562c9f05486584dac024fa6b2ad8fba2b5d360c06abf019.bin vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f58525eaa502fca29562c9f05486584dac024fa6b2ad8fba2b5d360c06abf019.bin
Files
-
119384ff7a2b5502994badc46ebd4ef5.bin.zip
Password: infected
-
f58525eaa502fca29562c9f05486584dac024fa6b2ad8fba2b5d360c06abf019.bin.exe windows x86
Password: infected
88b32d8d6714552a4c940d628ce14f81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3d9
Direct3DCreate9Ex
kernel32
QueryPerformanceCounter
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetAsyncKeyState
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegOpenKeyExA
msvcp140
?uncaught_exceptions@std@@YAHXZ
wininet
InternetReadFile
imm32
ImmSetCandidateWindow
dwmapi
DwmExtendFrameIntoClientArea
winmm
PlaySoundA
vcruntime140
memmove
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-convert-l1-1-0
strtod
api-ms-win-crt-stdio-l1-1-0
_set_fmode
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
strncmp
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-filesystem-l1-1-0
_lock_file
api-ms-win-crt-time-l1-1-0
_time64
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 464KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ