Behavioral task
behavioral1
Sample
1dcc754c6de0e58a044e3bf14de83ce6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dcc754c6de0e58a044e3bf14de83ce6.exe
Resource
win10v2004-20231215-en
General
-
Target
1dcc754c6de0e58a044e3bf14de83ce6
-
Size
3.2MB
-
MD5
1dcc754c6de0e58a044e3bf14de83ce6
-
SHA1
79200067687bc6cf908005cf85b26b6b05bd3fb7
-
SHA256
91398bfc22c7aee3388aa33c4b103102266883db8183618568b0082cf4cd16a1
-
SHA512
3217699afafdf24b034939a4e552406fa83dd895366c8f553f33e8305cc179aa04caefd375c78dcb9d231133b23560dde526b71387985674077eec3447aa3161
-
SSDEEP
98304:JCIq7/ZudFQ3yhB8KaR7ADw2pXZKAR6Nt3:sI0BkF+AmKaJADDpXb6P3
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1dcc754c6de0e58a044e3bf14de83ce6
Files
-
1dcc754c6de0e58a044e3bf14de83ce6.exe windows:10 windows x64 arch:x64
701ac293455ef5398ebec887398165ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcAddress
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
gdi32
CreateDCW
user32
PostMessageW
CharUpperBuffW
api-ms-win-crt-string-l1-1-0
memset
api-ms-win-crt-runtime-l1-1-0
_c_exit
api-ms-win-crt-private-l1-1-0
_o__callnewh
api-ms-win-core-com-l1-1-0
CoCreateFreeThreadedMarshaler
api-ms-win-core-shlwapi-legacy-l1-1-0
PathFileExistsW
api-ms-win-shcore-obsolete-l1-1-0
SHStrDupW
api-ms-win-shcore-path-l1-1-0
ord170
api-ms-win-shcore-scaling-l1-1-1
GetDpiForMonitor
api-ms-win-core-rtlsupport-l1-1-0
RtlVirtualUnwind
api-ms-win-core-errorhandling-l1-1-0
RaiseException
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
api-ms-win-core-processthreads-l1-1-1
GetProcessMitigationPolicy
api-ms-win-core-synch-l1-1-0
InitializeCriticalSectionAndSpinCount
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
api-ms-win-core-interlocked-l1-1-0
InitializeSListHead
api-ms-win-core-libraryloader-l1-2-0
LoadLibraryExW
api-ms-win-core-winrt-string-l1-1-0
WindowsDeleteString
api-ms-win-core-winrt-error-l1-1-0
SetRestrictedErrorInfo
api-ms-win-core-winrt-l1-1-0
RoInitialize
api-ms-win-core-winrt-error-l1-1-1
RoGetMatchingRestrictedErrorInfo
api-ms-win-eventing-provider-l1-1-0
EventProviderEnabled
api-ms-win-core-synch-l1-2-0
Sleep
comctl32
CreateStatusWindowW
wtsapi32
WTSSendMessageW
advapi32
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
Sections
.text Size: - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ