Behavioral task
behavioral1
Sample
64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b.exe
Resource
win10v2004-20230915-en
General
-
Target
64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b
-
Size
7.7MB
-
MD5
939ed7311af464865166625df740cf56
-
SHA1
478935e92ad30670e767657fa8437bad31f41e03
-
SHA256
64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b
-
SHA512
2306d85e4e08d8f18c52825fddedab18081dd21fe50f5835087556ed2593ea61277c223f5183055a13c2e815409045e8420d9a934408de5718301c72bbe47a19
-
SSDEEP
196608:yS/hSCBE8r94sYLUEAKub0MDcQHuyNSksYlf7eumG:ySBpEAKu0MDcyiJ8fPmG
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b
Files
-
64c1874af05c22b5ec8a206cda07f03fd44d66d883f68495af4db7509c47175b.exe windows:5 windows x86
ab6090d245762c61af04615a00a6e690
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
DrawDibDraw
avifil32
AVIStreamGetFrame
winmm
midiStreamRestart
ws2_32
ntohl
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
LoadStringA
CharUpperBuffW
gdi32
RoundRect
winspool.drv
OpenPrinterA
comdlg32
ChooseColorA
advapi32
RegCloseKey
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
oleaut32
RegisterTypeLi
comctl32
_TrackMouseEvent
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 910KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ