Behavioral task
behavioral1
Sample
d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790.exe
Resource
win10v2004-20230703-en
General
-
Target
d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790
-
Size
15.3MB
-
MD5
990fd3beb548bef684f43fe83327f8b6
-
SHA1
949a91ae5fde249d75d552c280f7757ffae351dc
-
SHA256
d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790
-
SHA512
e6a44a67950b2e8385eea9819d51b88c0a96739acc3031f94488a110dd06d395aba376582ed6833dbe32fe8bad7c26534a5cffcf13fdf2588c891243ef3095e9
-
SSDEEP
393216:1eyc6kmBPLzjRtO8qsWYIUnbiexzcHtuwj6VR0:Y1VqPLDbxfIWbiexzcHtx
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790
Files
-
d42c0b92d4f439187093694015aa825b886d571aaf2093a6cd0700b5fa9ce790.exe windows x86
478baeccb16a53a3a6063f93c8497128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
waveOutRestart
ws2_32
gethostname
rasapi32
RasHangUpA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ScrollWindowEx
CharUpperBuffW
gdi32
CreateRectRgn
winspool.drv
DocumentPropertiesA
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
SafeArrayCreate
comctl32
ord17
wininet
InternetCloseHandle
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 507KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 8.5MB - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ