Behavioral task
behavioral1
Sample
3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44.exe
Resource
win10v2004-20230915-en
General
-
Target
3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44
-
Size
4.1MB
-
MD5
734f5ef7e66fe19eafd589e3d395bb0a
-
SHA1
39c9d222326435d47331d08f5ad378b19ffe1886
-
SHA256
3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44
-
SHA512
e89ee9ebf6cffbf97d8590ca5b1defcf80cedec863a1cb277bc33325fea0d99ee3779444c1a77eee526cb96f4b4bda06938cb1ff224ced14cd03c1f68c8669fd
-
SSDEEP
98304:qiVB3bCz6RpyoCEoV5QXt9ptPykUExlJcaoaxPnSJyZD:qiVB33pLCEoQBK3UlaaDPjD
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44
Files
-
3995867ea88674af3381b35cc48fcc45d9636f863e0658f54972819793106a44.exe windows:5 windows x86
447ba74682cd6cb05cd09fc84d367cf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamStop
ws2_32
WSACleanup
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ScrollWindowEx
CharUpperBuffW
gdi32
DeleteDC
msimg32
GradientFill
winspool.drv
DocumentPropertiesA
comdlg32
GetSaveFileNameA
advapi32
RegCreateKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoRevokeClassObject
oleaut32
SafeArrayAccessData
comctl32
ord17
oledlg
ord8
wininet
FindNextUrlCacheEntryA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Ǭ����� Size: - Virtual size: 1.0MB
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ