Behavioral task
behavioral1
Sample
0ff3a02fcc238dbc877411356cf71569.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ff3a02fcc238dbc877411356cf71569.exe
Resource
win10v2004-20231222-en
General
-
Target
0ff3a02fcc238dbc877411356cf71569
-
Size
1.0MB
-
MD5
0ff3a02fcc238dbc877411356cf71569
-
SHA1
ef29d92a22728540637fe8a6ca6b28c5769fcf60
-
SHA256
e198279bfe7fd0d5ea1773a209140071aa313d105033c0d26fc820135648814b
-
SHA512
cf7ea95561d04852cbbf0e279198b30196e659f537da5aa417ee950171d5af6bdcae22717f4e1f1c39e1a48f558295f34ee95005a829d31b2e3d0a2ecfce1d5c
-
SSDEEP
24576:mNxENZNhpVKInK8khxchC2l1ZPlwyNJhxDcoUjrJn0avsj:mHExVKwkl2LnwyrDcxp0av
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ff3a02fcc238dbc877411356cf71569
Files
-
0ff3a02fcc238dbc877411356cf71569.exe windows:4 windows x86 arch:x86
01bd25bc5bb052aa674fd55476cc6c03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
ClientToScreen
MessageBoxA
gdi32
CreateRectRgn
winmm
midiOutReset
winspool.drv
DocumentPropertiesA
advapi32
RegQueryValueExA
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SysAllocStringLen
comctl32
ord17
oledlg
ord8
ws2_32
WSACleanup
comdlg32
GetSaveFileNameA
Sections
.text Size: - Virtual size: 671KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1004KB - Virtual size: 1003KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE