Behavioral task
behavioral1
Sample
e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe
Resource
win10v2004-20231215-en
General
-
Target
e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe.zip
-
Size
13.5MB
-
MD5
b6d79e75d6aebe37cf39e4cc18101979
-
SHA1
f218154c962791496314d64d61d59cd8a33d11e0
-
SHA256
43582e83ba6f6e74f8efe7e2a71d241346c13416e2ecdbaacbf4ab54ddb7dd2b
-
SHA512
80633650007e191e6c3e03934897b5b153e5b1bd2fceac8ad6c1870e85ea122b9ce49f44997e3b853445bd2f26c9abae35bd2bce7b49afb5ebca3e838a05da92
-
SSDEEP
393216:q+YcNXRBCvl1Oqh1J0qgbBcjshNgV9WA7jBIPl1HaLyhBiNbT+xrcf:RYGBYbZh1J2kSuPznBIPWLyT0Tiwf
Malware Config
Signatures
-
resource yara_rule static1/unpack001/e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe
Files
-
e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe.zip.zip
Password: infected
-
e9d5c6111f828f8c4cdcf45a5ec9fcb4359ba14a383a042696706c294f98a57a.exe.exe windows:5 windows x86 arch:x86
70a8e53bce2029386b1253ba7bdc35ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetVersionExW
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
LoadImageW
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
LineTo
advapi32
FreeSid
shell32
ShellExecuteW
ole32
CLSIDFromProgID
msimg32
AlphaBlend
shlwapi
PathFindFileNameW
uxtheme
DrawThemeBackground
gdiplus
GdipCreateFontFromDC
winmm
PlaySoundW
wininet
InternetOpenUrlW
oleacc
LresultFromObject
imm32
ImmGetContext
winspool.drv
ClosePrinter
oleaut32
SysFreeString
comctl32
ord17
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 10.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 13.7MB - Virtual size: 13.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ