Behavioral task
behavioral1
Sample
03c7bfcad6c13938041760d456260c82.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03c7bfcad6c13938041760d456260c82.exe
Resource
win10v2004-20231222-en
General
-
Target
03c7bfcad6c13938041760d456260c82
-
Size
1.1MB
-
MD5
03c7bfcad6c13938041760d456260c82
-
SHA1
793452d3c1e458958ea3f21c1fd41987857d85f9
-
SHA256
e1a9834014eba48ea367ad80307576467077785fdcac574a4822bc510f62c2bd
-
SHA512
492cb8a77cb426156305e46c891e84f7a3e6034e9a53edab5cf9c1b8c0a22b21c6615ae57410fd030e7fd810cbcf9bdfae0e7445260ab0e59fe680acb2acac34
-
SSDEEP
24576:muZ54jl7oSPiL4dq9pyVEJQDnqmjhoEUet9o:H4jxoDL4dqTyVEJeJhnUc9o
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03c7bfcad6c13938041760d456260c82
Files
-
03c7bfcad6c13938041760d456260c82.exe windows:4 windows x86 arch:x86
15ee9b54f33c18b6879e319bb7715a65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
kernel32
MultiByteToWideChar
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
ScrollWindowEx
gdi32
DeleteObject
winmm
midiStreamClose
winspool.drv
ClosePrinter
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
ord17
ws2_32
closesocket
Sections
.text Size: - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 317KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE