Behavioral task
behavioral1
Sample
2e92957cb7f3dd220e39ea2fbafad734.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e92957cb7f3dd220e39ea2fbafad734.dll
Resource
win10v2004-20231215-en
General
-
Target
2e92957cb7f3dd220e39ea2fbafad734
-
Size
108KB
-
MD5
2e92957cb7f3dd220e39ea2fbafad734
-
SHA1
8a34c95f9724feb178e0e5e59decee944b5276d8
-
SHA256
13bc6ac6c44885a363b402309061b00de64f9551046c08980b80ee91a0b6cf79
-
SHA512
9ef17e7745e499304dff84650f199bd901e2f27827bb707df703df6c5bb498e76bf3c7fb46c76293681e944386588e86d5bd15728cb6939980b2b247cd11b259
-
SSDEEP
3072:fZe7g0K6lnRARtFO/o4eZonzMo131NTO8B:x0K6lRlF0onPlNTOW
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e92957cb7f3dd220e39ea2fbafad734
Files
-
2e92957cb7f3dd220e39ea2fbafad734.dll windows:4 windows x86 arch:x86
ee30837324ed5b3e573631bb97e25e25
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
GetProcAddress
GetModuleHandleA
VirtualProtect
GetVersion
CreateThread
Thread32Next
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
SuspendThread
OpenThread
Thread32First
CreateToolhelp32Snapshot
ResumeThread
GetModuleFileNameW
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
user32
PostMessageA
MapVirtualKeyA
MessageBoxA
CallWindowProcA
GetWindowLongA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
winmm
timeGetTime
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ