Behavioral task
behavioral1
Sample
1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798.exe
Resource
win10v2004-20230915-en
General
-
Target
1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798
-
Size
5.1MB
-
MD5
5e6edab6b23102925ce1107b31859ed7
-
SHA1
5674bcffc3311d14658ad736dcd19d0e7539f5d8
-
SHA256
1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798
-
SHA512
1a3b78f30325eb90444cd86d7958a7110638b9e5bd9538331914722a564c7b34f976640b6b5148c14503d08b4af502c986cb353241c95915c8e3cde5c3f583bd
-
SSDEEP
98304:zyluMsmMtfjqrVHNAemQPG/LOD43SKBef3gdPWdveWeEy/hDMkmvH6G6n9Z67:+/amrV2fQeSD433o/gded2WevbnM
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798
Files
-
1dd689aaab73967d0577fd235f0f7193f99e40fd7e3d6df36672c356f7745798.exe windows:5 windows x86
0bc9c67098624bddc80f874160ec0368
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetVersion
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ShowWindow
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetDeviceCaps
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
Shell_NotifyIconA
comctl32
ord17
mems
?DogDataMacro@@YAHPAXHPAH@Z
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ