Behavioral task
behavioral1
Sample
93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5.exe
Resource
win10v2004-20230703-en
General
-
Target
93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5
-
Size
1.6MB
-
MD5
40e9f83449152813694fe4fb949f3286
-
SHA1
892ac680d6efe4fe04e02c873a820f224bfb49c9
-
SHA256
93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5
-
SHA512
0d54eb87265e301728b23f933b9dedb257e1d9f941ecc5ccf46d689c3ac932841bd0c5194848236cdc010ef92f5af93718b54fe38c070d62f7a9281cf88833ce
-
SSDEEP
24576:P65vIBX8VqFdc/l1zhffV1kW25Q1G1bu/Dxq/sdOOvuw0wiH0p:kIZ8VBldhffMWaQgUQkd5vN0wiUp
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5
Files
-
93d699a6e4c2cf7e62dd69678b1d4bac8f545496f16881ce07ef4d4cf49c8ed5.exe windows x86
65f0146f56e27b48727c48aefb0c082f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
kernel32
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
InterlockedIncrement
FileTimeToSystemTime
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
CreateFileW
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
CreateFileA
SetEnvironmentVariableA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
InterlockedDecrement
LocalFree
MulDiv
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
FreeLibrary
VirtualProtect
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetCurrentProcess
SetLastError
GetModuleHandleW
GetVersionExW
GetSystemInfo
FormatMessageW
GetCurrentProcessId
lstrlenW
GetVersion
CompareStringW
WideCharToMultiByte
lstrlenA
CompareStringA
GetModuleHandleA
VirtualQuery
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
DeleteCriticalSection
RaiseException
MapViewOfFile
CreateFileMappingA
CreateDirectoryW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
CreateMutexW
GetProcAddress
LoadLibraryW
OpenProcess
InitializeCriticalSection
TerminateProcess
SetEvent
GetHandleInformation
CreateEventW
GetLastError
CreateProcessW
OutputDebugStringA
WritePrivateProfileStringW
Process32NextW
PeekNamedPipe
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
OutputDebugStringW
CreatePipe
FindClose
Sleep
FindNextFileW
FindFirstFileW
GetPrivateProfileIntW
GetPrivateProfileStringW
DeleteFileW
CopyFileW
GetTickCount
CloseHandle
ReleaseMutex
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
SetCapture
ReleaseCapture
CharNextW
CopyAcceleratorTableW
IsRectEmpty
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
PostThreadMessageW
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemInt
CheckDlgButton
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
EndPaint
BeginPaint
GetDC
ClientToScreen
GrayStringW
UnregisterClassA
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageW
UnregisterClassW
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
GetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
LoadCursorW
GetSysColorBrush
WindowFromPoint
SetWindowContextHelpId
MapDialogRect
CharUpperW
SetCursor
GetMessageW
TranslateMessage
ValidateRect
SendDlgItemMessageA
PostQuitMessage
GetSystemMenu
SetTimer
UpdateWindow
GetWindow
GetWindowTextW
GetParent
IsWindowVisible
GetCursorPos
EnableMenuItem
GetMessagePos
IsWindow
FindWindowExW
GetWindowThreadProcessId
wsprintfW
ReleaseDC
GetWindowRect
IsZoomed
AppendMenuW
CreatePopupMenu
DrawIconEx
LoadImageW
GetWindowDC
DrawIcon
GetClientRect
LoadIconW
PtInRect
EnableWindow
GetWindowLongW
SendMessageW
InvalidateRect
IsIconic
SetWindowPos
GetSystemMetrics
DrawTextExW
MessageBoxA
gdi32
ExtSelectClipRgn
DeleteDC
CreateBitmap
GetDeviceCaps
PtVisible
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
CreateCompatibleDC
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
DeleteObject
GetObjectW
GetStockObject
BitBlt
CreateFontW
GetTextExtentPoint32W
RectVisible
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegOpenKeyW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantTimeToSystemTime
SysAllocString
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SystemTimeToVariantTime
gdiplus
GdiplusShutdown
Sections
.text Size: 560KB - Virtual size: 558KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 476KB - Virtual size: 474KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ