Behavioral task
behavioral1
Sample
0e0e48c3898b5bcb2d13eb5b48e91cb8e89be0b4a0e9db22623679d8f25681b3.exe
Resource
win10v2004-20230915-en
General
-
Target
12109550175.zip
-
Size
13.4MB
-
MD5
2234fba300f2febd163fb60163e8201e
-
SHA1
9a61e8a8c98502b48b1feae6325bebe47a474ea4
-
SHA256
7093f58fe58bc029c3caa1fbc23858788bf745dbbad565db60543d1db2718903
-
SHA512
dbcc5e20e67b72a33681f2af57c70f8e417316a8118cf9a13c85f54200166da43f8f85c2cf1a87ffacc7b6940f6a3683c1e6fa7ac4201484cf58cbbd2b5838cf
-
SSDEEP
393216:qxfD371W6ONzrPdAQsdbzWaxNt66ES/A7DvO0xykW7e:2b37M6OJpAQsdHt66uj8kZ
Malware Config
Signatures
-
resource yara_rule static1/unpack001/0e0e48c3898b5bcb2d13eb5b48e91cb8e89be0b4a0e9db22623679d8f25681b3 vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0e0e48c3898b5bcb2d13eb5b48e91cb8e89be0b4a0e9db22623679d8f25681b3
Files
-
12109550175.zip.zip
Password: infected
-
0e0e48c3898b5bcb2d13eb5b48e91cb8e89be0b4a0e9db22623679d8f25681b3.exe windows:5 windows x86
bf84f2351361fed6e44981897422ef2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamOut
ws2_32
socket
rasapi32
RasGetConnectStatusA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetScrollRange
CharUpperBuffW
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
VariantChangeType
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 7.8MB - Virtual size: 7.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ