Behavioral task
behavioral1
Sample
5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413.exe
Resource
win10v2004-20230915-en
General
-
Target
5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413
-
Size
10.9MB
-
MD5
8d137c193db4d2032bc4377facee2a09
-
SHA1
4320e5bb33b214175350c78a823613624f35c381
-
SHA256
5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413
-
SHA512
a16d6412c316b20a690cbd328af36377fcdc7b520870f89ba2aa95f08af3139223795e565d2fc6a407e587e5adcf4f0bd76b7042401eaed6d1148f9e545ef8e6
-
SSDEEP
196608:ptaTiW1GVeIH/+fa/faAGbwju4DOk/+QOMZqPQRVHSBwd:p9WUVeK/TflQwjxaYFZ0gsmd
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413
Files
-
5250bc4222739daae953e93680a017ddebac6598a6facd1a48a0ed707ae7f413.exe windows:5 windows x86
42911b642b96697655e9a8c07ebc6970
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
winmm
midiStreamRestart
ws2_32
select
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClipboardData
CharUpperBuffW
gdi32
ExtSelectClipRgn
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
ShellExecuteA
ole32
OleRun
oleaut32
SafeArrayAccessData
comctl32
ord17
wininet
InternetCanonicalizeUrlA
comdlg32
ChooseFontA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 10.9MB - Virtual size: 10.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ