Behavioral task
behavioral1
Sample
164940a0635ee091895739e9c0d51b5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
164940a0635ee091895739e9c0d51b5a.exe
Resource
win10v2004-20231215-en
General
-
Target
164940a0635ee091895739e9c0d51b5a
-
Size
293KB
-
MD5
164940a0635ee091895739e9c0d51b5a
-
SHA1
d4f8913dfc540f023a768d47f73aaa1d5d6e4d26
-
SHA256
e4f838c324555da8514d6cbb1b92435c4697ed2023e5c1052084d73f4204e53e
-
SHA512
4f7f37cb6350d614ec4b666f0714c67dba33eea52637d09c8b63ec8e0daeec91d841fd8ef96f83af0041318476a29bdfbfec330b9db5d139e63ccf5f281f5e71
-
SSDEEP
6144:UIv8OltLH58PCEUxI2IgSikLeO8RFvS03SMZ3inmciZHiT8m70kHh907lpZ:UIv/ltLZiUxIbbik6y03SMjO8m70kHhq
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 164940a0635ee091895739e9c0d51b5a
Files
-
164940a0635ee091895739e9c0d51b5a.exe windows:4 windows x86 arch:x86
2d27bd6677a7e4c8d1ad248fa665cf94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
LoadLibraryA
Process32Next
OpenProcess
TerminateProcess
Process32First
CreateToolhelp32Snapshot
SetFilePointer
ReleaseMutex
CreateMutexA
GetCommandLineA
Sleep
GetCurrentThreadId
GetStartupInfoA
ReadFile
lstrcmpA
GetFileAttributesA
SetLastError
lstrcmpiA
lstrcpyA
GetTempPathA
GetTickCount
FindResourceA
LoadResource
HeapFree
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
CloseHandle
FreeResource
MoveFileA
SetFileAttributesA
DeleteFileA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
SetUnhandledExceptionFilter
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
PostThreadMessageA
wsprintfA
GetInputState
GetMessageA
MessageBoxA
advapi32
AddAce
CloseServiceHandle
RegCreateKeyA
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
OpenSCManagerA
StartServiceA
OpenServiceA
CreateServiceA
msvcrt
exit
_except_handler3
realloc
malloc
strchr
strncat
??2@YAPAXI@Z
strncpy
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
_strupr
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
netapi32
NetUserGetLocalGroups
NetApiBufferFree
Sections
.text Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 289KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ