Behavioral task
behavioral1
Sample
eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03.exe
Resource
win10v2004-20230915-en
General
-
Target
eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03
-
Size
15.9MB
-
MD5
29c3c27ab12c2f9ccee84849be7ce446
-
SHA1
e1f934decadbf1a5a514eb5a3d236582ab6562e6
-
SHA256
eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03
-
SHA512
7a2627196dfb658a79bb30d063634eaa4b6dc0dd21dcb980169b76675448e7044eb4b6d49190ae0a0830df087f451a1041fabf4725a4e10c19d1136982ed67a7
-
SSDEEP
393216:ykYiKbKHHtkr78gA9WxghyUWFTIwNK1QHzmSYzml:ykK7W1DG3Tfl
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03
Files
-
eed1e068eef8e9a2740549cedb2db02ab0b615a51e17257ada11b62e86445a03.exe windows:5 windows x86
f5151e63f951542420f03e2fa50c82d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamOut
ws2_32
socket
rasapi32
RasGetConnectStatusA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetScrollRange
CharUpperBuffW
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
oleaut32
VariantChangeType
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 11.5MB - Virtual size: 11.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ