Behavioral task
behavioral1
Sample
30a22eae09465db2e86c983a05dfefe17de4c24a76d4e080ff7f4017bd725ffd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
30a22eae09465db2e86c983a05dfefe17de4c24a76d4e080ff7f4017bd725ffd.exe
Resource
win10v2004-20230915-en
General
-
Target
ac2af74868a38ce07b19bdddf49101e8.bin
-
Size
5.7MB
-
MD5
b027e3157325aa76215ba5ea62697f3d
-
SHA1
1b6dab22a854240b46adb44de6cb68daba771ba1
-
SHA256
1b059174a213138eb75f4bc7bf3b0a85748b729bfc2decfb428f6da055790fea
-
SHA512
c4d335034afb4df5beb466c213ba82de63af64a024d6d645b83034bd811ad763f5ab964f8754d0b1d612d6d6e123b6b50cdb7ee033c79893118714c359753276
-
SSDEEP
98304:mBHDoQOld5Bjvkb5sefVr3Oqc81SLaSzhvwhGkc5CLeL4D2COeOSyEPeMTiCt+Z:mBHFOP5FvkbVf93Oc1S2Sjk2OxNO9bQq
Malware Config
Signatures
-
resource yara_rule static1/unpack001/30a22eae09465db2e86c983a05dfefe17de4c24a76d4e080ff7f4017bd725ffd.exe vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/30a22eae09465db2e86c983a05dfefe17de4c24a76d4e080ff7f4017bd725ffd.exe
Files
-
ac2af74868a38ce07b19bdddf49101e8.bin.zip
Password: infected
-
30a22eae09465db2e86c983a05dfefe17de4c24a76d4e080ff7f4017bd725ffd.exe.exe windows:6 windows x64
86f46db29a0561f1a0f20ffeb8c61331
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
dbghelp
ImageNtHeader
kernel32
DecodePointer
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
ws2_32
recv
advapi32
ConvertSidToStringSidA
user32
GetAsyncKeyState
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
ntdll
RtlCaptureContext
userenv
UnloadUserProfile
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 462KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ