Behavioral task
behavioral1
Sample
2200-3-0x0000000000E20000-0x0000000001657000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2200-3-0x0000000000E20000-0x0000000001657000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2200-3-0x0000000000E20000-0x0000000001657000-memory.dmp
-
Size
8.2MB
-
MD5
1921b25b8a1797d63b42f5b320423c3d
-
SHA1
c6d0dad1c7aef5de98618b79d08da728874c9766
-
SHA256
de40f089a5deadebe6e668b818d068ff5b41e271a13c6b1a7f99d8916f18a52b
-
SHA512
bb6680ba7ed38b12350a60e61eb014ce3c686a2f31072208521e226f2221b511eb8742b6cbd8d97efdedfcb8d68870b3719db99c4d937a3301d5fc5167592a2b
-
SSDEEP
196608:7+DlwHfpsNjvZzmoD9ho/HPwuCbfrOpy608M6/:7XH+NjvZmvXNufrO0d
Malware Config
Signatures
-
Privateloader family
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2200-3-0x0000000000E20000-0x0000000001657000-memory.dmp
Files
-
2200-3-0x0000000000E20000-0x0000000001657000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ