Behavioral task
behavioral1
Sample
30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801.exe
Resource
win10v2004-20230915-en
General
-
Target
30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801
-
Size
12.8MB
-
MD5
d0782609019d12a3cb20d6abea7e2770
-
SHA1
895d299a09820e7f48d35086f15d1560d1e0d196
-
SHA256
30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801
-
SHA512
942696ee9f925d0d0748f2be88ac4111c4772042ce8a62294f69d656c94139667b7d7ed4f6e0b4829ca5f52fd7de926591bad7696f9c12b534f90a0f79363fe5
-
SSDEEP
393216:VLj9mBKlkIFi1XSZf6knr8cX/3AGYn8tc:VLj9vkzXSZik4i3Nu
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801
Files
-
30ee20474945532aada7afe623aeba2ef0d34a3db0decc80b8888dcc9621d801.exe windows:5 windows x86
478baeccb16a53a3a6063f93c8497128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
waveOutRestart
ws2_32
gethostname
rasapi32
RasHangUpA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ScrollWindowEx
CharUpperBuffW
gdi32
CreateRectRgn
winspool.drv
DocumentPropertiesA
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
SafeArrayCreate
comctl32
ord17
wininet
InternetCloseHandle
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 507KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 8.5MB - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 268KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ