Behavioral task
behavioral1
Sample
13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793.dll
Resource
win10v2004-20230915-en
General
-
Target
13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793
-
Size
1.3MB
-
MD5
096cd7a69922e0d12c987a2f84d31402
-
SHA1
538abbe81dd3205c351ad16a4eebc655c475d1b5
-
SHA256
13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793
-
SHA512
44968bab607f407a6d740c751732cc68f0036bec617ff7002e4c93078ae61c1b472868a5c98f84f4597bb17fa0994b568784f9690639e51b2276efd04ca1f141
-
SSDEEP
24576:3+xSG8HOSm8oqaBDpDfbrKtMNkerE3xUgazUsh4zDqTkt/:lpmXvUMNr+shPIt/
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793
Files
-
13fc3dc69a9a4b58af35fe7a0b1e6ef2c7dacd23a44235bd2b7f2667604e6793.dll windows x86
8519fe267c12cdad1a8eb54a60160ad5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFilePointer
FlushFileBuffers
GetVolumeInformationA
GetModuleFileNameW
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetModuleHandleW
GlobalFlags
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
HeapSize
GetACP
lstrcmpW
LCMapStringA
GlobalGetAtomNameA
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetVersionExA
FreeResource
GlobalAddAtomA
IsBadCodePtr
GetEnvironmentVariableA
GetVersion
GetLocalTime
TerminateThread
GetExitCodeThread
OpenMutexA
lstrcpyn
QueryPerformanceFrequency
DeviceIoControl
RtlMoveMemory
LCMapStringW
GlobalFindAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
InterlockedDecrement
InterlockedIncrement
MapViewOfFile
CreateFileMappingA
FreeLibrary
GetProcAddress
LoadLibraryA
Module32Next
Module32First
CreateToolhelp32Snapshot
TerminateProcess
ExitProcess
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WriteFile
GetFileAttributesA
FindNextFileA
GetWindowsDirectoryA
ReadFile
CreateFileA
GetLastError
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
FindFirstFileA
lstrlenA
lstrlenW
MultiByteToWideChar
IsBadWritePtr
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexA
VirtualFree
VirtualAlloc
OutputDebugStringA
VirtualProtect
GetTickCount
IsBadReadPtr
OpenProcess
ReadProcessMemory
LockResource
SizeofResource
LoadResource
FindResourceA
WideCharToMultiByte
Sleep
FreeLibraryAndExitThread
GetCurrentProcessId
GetModuleHandleA
CreateThread
IsValidCodePage
CloseHandle
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
UnregisterClassA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CopyRect
PtInRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
SendMessageA
EnableWindow
GetWindowRect
wsprintfA
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
AdjustWindowRectEx
GetClientRect
IsWindowVisible
SetTimer
GetDlgItem
wvsprintfA
GetWindowTextLengthA
GetSystemMetrics
RedrawWindow
FindWindowExA
GetWindowThreadProcessId
CallWindowProcA
SetForegroundWindow
GetKeyState
DefWindowProcA
SetWindowLongA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
GetMenuState
gdi32
SelectObject
CreateFontIndirectA
DPtoLP
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
CreateSolidBrush
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SetViewportOrgEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
OleRun
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
VariantChangeType
GetErrorInfo
SysAllocString
uxtheme
EnableThemeDialogTexture
winmm
PlaySoundA
sndPlaySoundA
imm32
ImmGetVirtualKey
Sections
.text Size: 874KB - Virtual size: 873KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ