DeleteSelf
Behavioral task
behavioral1
Sample
10b25a0b649fc50f80bc036cc7351a6f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10b25a0b649fc50f80bc036cc7351a6f.dll
Resource
win10v2004-20231215-en
General
-
Target
10b25a0b649fc50f80bc036cc7351a6f
-
Size
74KB
-
MD5
10b25a0b649fc50f80bc036cc7351a6f
-
SHA1
c2ad9cb28cc43d8c3ac179500f54796be0327455
-
SHA256
f45120c06bc8c8b4d274b2399ca8a9e635eb9a08c5170db6569370914a90c553
-
SHA512
0990e55d45c8c25c3a7d16d90149a30ef91d9154838c70399273caa0c85c1cf38de914d97f8250d0075493a5c4b38d1006b302ae8bf5706d63f53e854bbf6744
-
SSDEEP
1536:H+jvejPejRK16Rr/+IqcveFWrIUFpxaAkbilfan:Oe4RK1ICIqcveFWrjb9kb6C
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10b25a0b649fc50f80bc036cc7351a6f
Files
-
10b25a0b649fc50f80bc036cc7351a6f.dll windows:4 windows x86 arch:x86
b829a3a9cadd83424a3646a377884cab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpynA
CreateFileA
ReadFile
GetFileSize
CloseHandle
GetTempPathA
DeleteFileA
MultiByteToWideChar
GlobalAlloc
GlobalLock
WriteFile
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
GetTickCount
Process32Next
VirtualAlloc
GetModuleHandleA
GetPrivateProfileStringA
CreateThread
WideCharToMultiByte
GetSystemTime
WritePrivateProfileStringA
IsBadReadPtr
SetFilePointer
GetModuleFileNameA
GetCurrentProcessId
CreateMutexA
GetLastError
lstrcmpiA
lstrlenA
ExitProcess
lstrcmpA
Sleep
VirtualProtect
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
Process32First
OutputDebugStringA
user32
ReleaseDC
IsRectEmpty
GetDC
GetSystemMetrics
GetWindowTextA
IsWindowVisible
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
FindWindowA
FindWindowExA
GetWindowThreadProcessId
GetWindowInfo
PrintWindow
EnumWindows
gdi32
BitBlt
DeleteObject
GetObjectA
CreateDCA
GetDeviceCaps
DeleteDC
GetStockObject
SelectPalette
RealizePalette
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
ws2_32
shutdown
inet_ntoa
gethostbyname
gdiplus
GdipCloneImage
GdipLoadImageFromFile
GdipGetImageEncodersSize
GdipDisposeImage
GdipAlloc
GdipFree
GdipGetImageEncoders
GdiplusStartup
GdiplusShutdown
GdipSaveImageToFile
wininet
InternetConnectA
HttpOpenRequestA
InternetOpenA
HttpSendRequestExA
HttpEndRequestA
InternetCloseHandle
HttpAddRequestHeadersA
msvcrt
_local_unwind2
??3@YAXPAX@Z
atoi
malloc
free
memmove
strrchr
strstr
sprintf
??1type_info@@UAE@XZ
memcpy
memset
_except_handler3
??2@YAPAXI@Z
shlwapi
StrChrW
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ