Static task
static1
Behavioral task
behavioral1
Sample
vipx86.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
vipx86.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
vipx86.exe
Resource
win10v2004-20230915-en
General
-
Target
vipx86.exe
-
Size
65KB
-
MD5
2757a5f7acfa49e4f1b250410cb539d5
-
SHA1
cb7496b5201150ced5557e4d0362167afdbb35ad
-
SHA256
6999dc7159dddbe7000ba5a4377d3d72610b85b8b4cad85795cbe05ff676f9a2
-
SHA512
ff1151f7a3074c36686cc1021a4b7fa1c595a3a364a4adc1d8de68521f9790602af5ee8551e60854a71aaca23f21db12a0d5b8c088e84851f39e122c460f2b97
-
SSDEEP
1536:+GP/2byTo1LkLMKgTwo3EIfjz16rnANO7DfN:+GubyM1LkLMKevv16MO9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource vipx86.exe
Files
-
vipx86.exe.exe windows:4 windows x86
9041dd50dc3ce89a237091e136473b38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fmode
_initterm
_iob
_lock
_onexit
_strrev
_unlock
calloc
exit
fprintf
fputc
free
fwrite
getc
getenv
islower
isspace
isupper
isxdigit
localeconv
malloc
memcpy
memmove
realloc
setlocale
signal
strchr
strerror
strlen
strncmp
strtol
strtoul
abort
tolower
ungetc
vfprintf
wcslen
atoi
user32
EnumWindows
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE