Behavioral task
behavioral1
Sample
416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af.exe
Resource
win10v2004-20230915-en
General
-
Target
416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af
-
Size
14.7MB
-
MD5
e7b248f0107fac31d4ce8e5ac7d11b53
-
SHA1
1a754c189a82962e050403e270a6dc1e7824a2ef
-
SHA256
416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af
-
SHA512
9835785602fc8d734c156faef9b38899f856b6d0b93afbbf3b5246f178b8b277e8d071e518a57ae8ae7d48ba055ad626cc1fe4791894e4d7c650282778c594f3
-
SSDEEP
393216:+ojjk3fCQcDGbj9teiwJEW7aYEf1IfsHqxOl80lJ1:+ojkV2gtSJ3aYWWZT0lJ1
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af
Files
-
416cb963ef21886950f83933d98e17bc369d0e155c15e8b40b7ba5dbada008af.exe windows:5 windows x86
adfa38aca603384feea4f7e0ef3eec3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetVersionExA
GetVersion
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
MapWindowPoints
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetObjectW
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
advapi32
RegCreateKeyW
shell32
DragAcceptFiles
comctl32
ImageList_GetIconSize
shlwapi
PathStripToRootW
ole32
CoTreatAsClass
oleaut32
OleCreateFontIndirect
gdiplus
GdipGetImagePalette
ws2_32
listen
winmm
PlaySoundW
oledlg
OleUIBusyW
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 497KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 11.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 14.5MB - Virtual size: 14.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ