Behavioral task
behavioral1
Sample
049943ea34b7bd4a82ff7599b0615fe0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
049943ea34b7bd4a82ff7599b0615fe0.dll
Resource
win10v2004-20231215-en
General
-
Target
049943ea34b7bd4a82ff7599b0615fe0
-
Size
95KB
-
MD5
049943ea34b7bd4a82ff7599b0615fe0
-
SHA1
27045457fbe9c53f8030fb3616c125edcd22e793
-
SHA256
e91dff6823ba88211f36091694a2f72d54af7784d02f48c839c3092cf63491b3
-
SHA512
fa47b35ec086f2a143df663845a30b67b5fca8dcf4825838f08e2e875a9ee4d2af2e74810de6fc2d7ba2ac4acb3a596ee27b3922b501b08ebc4bf3e4d5ae80d1
-
SSDEEP
1536:oMJmWKNEo2mN86MowNdcsL8iNVbGtU+EjQREt7XQgpxbrn1az2k7EUkWuf46gGxi:oMJmWKNgAJwrzoGctULQRzKxXn1azFCc
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 049943ea34b7bd4a82ff7599b0615fe0
Files
-
049943ea34b7bd4a82ff7599b0615fe0.dll windows:4 windows x86 arch:x86
fedb7da80dcf0d5ae319f312fdafa740
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
Module32Next
Module32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
WideCharToMultiByte
GetPrivateProfileStringA
GetFileSize
CreateFileA
GetModuleHandleA
CreateThread
SetFilePointer
HeapAlloc
GetProcessHeap
OutputDebugStringA
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
ReadFile
FreeLibrary
user32
GetWindowThreadProcessId
GetDC
GetWindowRect
wvsprintfA
GetClassNameW
wsprintfA
GetKeyboardState
ToAscii
SendMessageA
AttachThreadInput
GetFocus
FindWindowA
GetWindow
wininet
DeleteUrlCacheEntry
urlmon
URLDownloadToFileA
gdi32
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
msvcrt
wcsncat
wcscpy
wcsstr
exit
printf
wcslen
time
srand
rand
malloc
_stricmp
tolower
_vsnprintf
_ltoa
_strupr
_strcmpi
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
strcpy
memset
memcpy
free
strncpy
sprintf
strrchr
strstr
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ