Behavioral task
behavioral1
Sample
test.vmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
test.vmp.exe
Resource
win10v2004-20230703-en
General
-
Target
test.vmp.exe
-
Size
4.7MB
-
MD5
72014ddd3ae51ed4f12bd9170aecbb58
-
SHA1
665a2554151ad582a27b5d7ed0ab79320c6520fd
-
SHA256
b30988128470c37e25fd8b9ba2ef44148c506f490b46e576e23752a13627a33b
-
SHA512
194609c60d9f89bf667d8dbbe82eadbf481364ee560fef9a794a1f09b2bbb2433bdeb979c796dbd14f046efc280f1f238b54a883626d45c361a5e9aa8d1f6e04
-
SSDEEP
98304:VYmet+yOOpC4gHAZtofAqtUHLnapwLJnsmH6vB8ZpJ8Gz:hytoAUoPnapwLtUB8PJ8K
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test.vmp.exe
Files
-
test.vmp.exe.exe windows x86
91bd3153f3033208d941fb2863c1f215
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_iob
kernel32
GetVersionExA
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
FreeSid
wsock32
getsockopt
ws2_32
WSARecv
wtsapi32
WTSSendMessageW
user32
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ