Behavioral task
behavioral1
Sample
b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30.exe
Resource
win10v2004-20230915-en
General
-
Target
b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30
-
Size
6.0MB
-
MD5
bfde6a21f151d0af5ac2e07e2f68287d
-
SHA1
fb9e28ad6daa1c9d7ac18af496b70fbb27e33c89
-
SHA256
b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30
-
SHA512
d7125342f04da29fa26db0d00c21bb659aa3e5e1b0bf76c276ebe3c21e6c90ac1246cc50e1b95af415fb899c5a3deb7819ffcacbb5135a86768066a5f48b8db5
-
SSDEEP
98304:NFYpT5I80se0JmGCAlHvp6jpHaAnnrCwCdCSw+6sp576ejyU7o4hRYVmxHhGAqD:NFYpysNBCsPEl6AnnrRCI7ipBLjG4h2r
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30
Files
-
b63e339f126a050e8fefa71892c176a343a7d2668711a2889dfb1cd8d6701b30.exe windows:6 windows x86
5bb9e5cd6c56384bc935fe3178bf91af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultUILanguage
GetOEMCP
GetCPInfo
FindClose
FindFirstFileA
FlushFileBuffers
GetFullPathNameA
LockFile
SetEndOfFile
SetFilePointer
UnlockFile
DuplicateHandle
GetVolumeInformationA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileAttributesExA
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
SystemTimeToTzSpecificLocalTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RtlUnwind
GetSystemInfo
GetLocaleInfoW
VirtualProtect
VirtualQuery
SetStdHandle
GetFileType
CreateThread
ExitThread
HeapQueryInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetStdHandle
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
GetStringTypeW
OutputDebugStringW
GetDateFormatW
GetTimeFormatW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
CreateFileW
SetEnvironmentVariableA
CompareStringW
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GetThreadLocale
FileTimeToSystemTime
GlobalFlags
lstrcmpA
GetSystemDefaultUILanguage
GetCurrentThread
ResumeThread
SuspendThread
SetThreadPriority
CreateEventA
SetEvent
CompareStringA
GlobalGetAtomNameA
GlobalFindAtomA
GlobalAddAtomA
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
FreeLibrary
GetSystemDirectoryW
EncodePointer
FormatMessageA
MulDiv
LocalFree
FreeResource
LoadLibraryW
GetModuleHandleW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
GetACP
MultiByteToWideChar
OutputDebugStringA
DeleteCriticalSection
GetPrivateProfileSectionA
DecodePointer
VirtualAllocEx
EnterCriticalSection
HeapSize
RaiseException
InitializeCriticalSectionEx
ReadFile
TerminateProcess
LeaveCriticalSection
VirtualFreeEx
OpenProcess
CreateRemoteThread
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
GetEnvironmentVariableA
WaitForSingleObject
CreateProcessA
GetFileSize
WriteFile
TerminateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrlenA
GetModuleHandleA
CopyFileA
MoveFileA
SetCurrentDirectoryA
GetModuleFileNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
CloseHandle
GetLastError
CreateSemaphoreA
WriteProcessMemory
GetProcAddress
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
lstrcpyA
GetCurrentDirectoryA
Sleep
DeleteFileA
WritePrivateProfileStringA
LockResource
SizeofResource
WideCharToMultiByte
VirtualAlloc
lstrcpynA
GetVersionExA
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
RegisterClipboardFormatA
PostThreadMessageA
MoveWindow
ShowWindow
GetMonitorInfoA
MonitorFromWindow
WinHelpA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetLastActivePopup
GetTopWindow
GetClassNameA
GetClassLongA
EqualRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowTextLengthA
RemovePropA
SetPropA
RedrawWindow
ValidateRect
GetForegroundWindow
SetMenu
GetMenu
GetCapture
GetKeyState
GetFocus
SetFocus
GetDlgCtrlID
SetWindowPos
IsChild
CreateWindowExA
GetClassInfoExA
RegisterClassA
CallWindowProcA
DefWindowProcA
GetMessageTime
GetMessagePos
PeekMessageA
DispatchMessageA
RegisterWindowMessageA
GetMenuItemCount
GetMenuItemID
GetSubMenu
SetActiveWindow
IsWindowEnabled
GetActiveWindow
GetNextDlgTabItem
GetDlgItem
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetParent
SendDlgItemMessageA
UnregisterClassA
FindWindowExA
FindWindowA
EnumWindows
IsWindowVisible
MessageBoxTimeoutA
SetWindowTextA
GetWindowTextA
IsHungAppWindow
GetWindowThreadProcessId
wsprintfA
UpdateWindow
InvalidateRect
SetTimer
EnableWindow
SendMessageA
PostMessageA
GrayStringA
GetWindowLongA
SetWindowLongA
CheckMenuItem
GetCursorPos
LoadIconA
ScrollWindow
DrawIcon
GetSystemMetrics
IsIconic
GetClientRect
LoadIconW
GetPropA
IsWindow
GetDesktopWindow
GetWindow
TrackPopupMenu
SetForegroundWindow
AppendMenuA
CreatePopupMenu
PtInRect
MessageBeep
GetNextDlgGroupItem
IsRectEmpty
SetRect
InvalidateRgn
GetWindowRect
MessageBoxA
CopyAcceleratorTableA
OffsetRect
CharNextA
KillTimer
ReleaseCapture
SetCapture
CharUpperA
LoadCursorA
GetSysColorBrush
RealChildWindowFromPoint
SetCursor
MapDialogRect
SetWindowContextHelpId
PostQuitMessage
DestroyMenu
TranslateMessage
GetMessageA
IntersectRect
ClientToScreen
EndPaint
BeginPaint
GetWindowDC
TabbedTextOutA
DrawTextExA
DrawTextA
ReleaseDC
GetDC
LoadBitmapW
SetMenuItemInfoA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
IsDialogMessageA
IsDlgButtonChecked
GetClassInfoA
CharUpperBuffW
MessageBoxW
gdi32
GetStockObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
RestoreDC
SaveDC
ExtSelectClipRgn
SelectObject
SetMapMode
TextOutA
ExtTextOutA
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
CreateFontIndirectA
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetClipBox
Escape
DeleteObject
CreateRectRgnIndirect
CreateBitmap
GetObjectA
SetTextColor
DeleteDC
GetDeviceCaps
SetBkColor
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
CryptHashData
RegEnumValueA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
shell32
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
SHBrowseForFolderA
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathIsUNCA
PathFileExistsA
PathStripToRootA
ole32
CoCreateInstance
CoInitialize
CLSIDFromString
CoRegisterMessageFilter
CLSIDFromProgID
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoGetClassObject
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleInitialize
OleUninitialize
CoCreateGuid
CoRevokeClassObject
OleFlushClipboard
CoTaskMemAlloc
OleIsCurrentClipboard
oleaut32
SysFreeString
SysAllocStringByteLen
SysAllocStringLen
VariantInit
VariantClear
VariantChangeType
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
SysAllocString
oledlg
ord8
urlmon
URLDownloadToFileA
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
DeleteUrlCacheEntry
dbghelp
MakeSureDirectoryPathExists
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ws2_32
gethostname
send
WSAGetLastError
connect
inet_addr
htons
socket
WSAStartup
closesocket
recv
oleacc
CreateStdAccessibleObject
LresultFromObject
wtsapi32
WTSSendMessageW
Sections
.text Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE