Behavioral task
behavioral1
Sample
f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522.exe
Resource
win10v2004-20231023-en
General
-
Target
f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522
-
Size
114KB
-
MD5
6f721bcb1e78abfe01edaa93ebd52c06
-
SHA1
43db7c0279042bd079dacd70b5c09a2939f374f0
-
SHA256
f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522
-
SHA512
c4b6afacf9752b09566b1e4a26ac3a8b643198106379d4db07770d0cce62e5c1baffdb662f8218dd9b53b15dc95b12bb1e27678eb32d3261b738aba58755bce9
-
SSDEEP
3072:kZt9RBS7i24bSeMBpIenEc//mqtvxXuN/GVeIx+9QPRHmAZT:kZt9924WekC1k//xX+uEw+9AT
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522
Files
-
f4521867535fa183e718dceb1d287cc9a86000e4ff033b94624a3e8874a56522.exe windows:5 windows x86
903472faf891db4c98514e7d045a6dd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
lstrlenA
CreateThread
VirtualFree
GetModuleFileNameW
GetTickCount
ExitProcess
GetFileSize
VirtualAlloc
ReadFile
CloseHandle
CreateFileW
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
ntdll
memset
_wtoi
memcpy
ole32
CreateStreamOnHGlobal
shlwapi
StrStrA
user32
wsprintfA
wsprintfW
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpReadData
WinHttpCloseHandle
WinHttpReceiveResponse
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE