Behavioral task
behavioral1
Sample
e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2.exe
Resource
win10v2004-20230915-en
General
-
Target
e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2
-
Size
8.4MB
-
MD5
21ee6c18275851ae001bb1714306a2db
-
SHA1
2a1ce09deacceae162099baf23abff9915807057
-
SHA256
e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2
-
SHA512
253b9bc913320d0b094e1ece9be18d7f41466a906fdd558490a90a355b0e9fbce84ee1e66e49b946db8d10a2256d896273007c83435c80fb3e4d9d5c72bdb749
-
SSDEEP
196608:IGIQk8HgABRes8mcHE4LnONcP1wUQLLRWw5hIwZz99igSn:vy8D4lHE4zDP1wUQLtWur8g4
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2
Files
-
e48c297c482f6ff2be702e8fa72c72ff0d78c3e6a34a57e4cf62d24c2ae3f7c2.exe windows:5 windows x86
01b6f3c7e8fc800134085f7662115796
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamRestart
ws2_32
setsockopt
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetMenu
CharUpperBuffW
gdi32
LineTo
winspool.drv
ClosePrinter
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
OleRun
oleaut32
UnRegisterTypeLi
comctl32
ImageList_GetImageCount
wldap32
ord29
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.maopo Size: - Virtual size: 1.0MB
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ