Runed
Behavioral task
behavioral1
Sample
3f3d70b779e2102a1c7ccd6be2eb4067.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f3d70b779e2102a1c7ccd6be2eb4067.dll
Resource
win10v2004-20231215-en
General
-
Target
3f3d70b779e2102a1c7ccd6be2eb4067
-
Size
50KB
-
MD5
3f3d70b779e2102a1c7ccd6be2eb4067
-
SHA1
1c622a0713e591df4a362526c3d0fc2ba87517d8
-
SHA256
76fbf0e89c8b25deefe1f17149dd09382a01da746bacea1bdb36186e1e22ccca
-
SHA512
b93dbaa893e439a121b218ef76a71ffacc6f9aa69889ef0d5d16b3ca66ac0b75e17291bf5fbbf3eada8862994a1ae88438dacd24cce1f36b87721509d88de53d
-
SSDEEP
768:1+yY1LclKX2cnSTHpAc1ndld8SHj9aQm/vfJhKLontqXVihF5P9/rEWR:8gKX9nSTH9ZdldXDVgLKLC//rE
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f3d70b779e2102a1c7ccd6be2eb4067
Files
-
3f3d70b779e2102a1c7ccd6be2eb4067.dll windows:4 windows x86 arch:x86
7a0e928805ebf0426072ed480370b985
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
InternetCheckConnectionA
msvcrt
_strlwr
??2@YAPAXI@Z
_mbscmp
_onexit
__dllonexit
_strupr
strstr
sprintf
strrchr
??3@YAXPAX@Z
mbstowcs
malloc
free
??1type_info@@UAE@XZ
strtol
_mbsrchr
fseek
fopen
_stat
__CxxFrameHandler
fclose
strncmp
fread
rasapi32
RasEnumConnectionsA
RasGetConnectStatusA
mfc42
ord4204
ord5683
ord5710
ord858
ord941
ord939
ord537
ord2818
ord389
ord3229
ord690
ord5204
ord1074
ord6881
ord354
ord5186
ord5442
ord1979
ord665
ord6657
ord5356
ord2393
ord1988
ord540
ord860
ord800
ord269
ord826
ord600
ord1578
ord6467
ord1243
ord1176
kernel32
MapViewOfFile
CreateFileMappingA
LocalFree
LocalAlloc
GetFileSize
UnmapViewOfFile
CreateProcessA
SetEndOfFile
GetShortPathNameA
GetTempPathA
GetSystemDirectoryA
Process32First
Process32Next
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
GlobalAlloc
FindFirstFileA
FindClose
LoadLibraryA
GetTempFileNameA
MoveFileA
GetCurrentProcessId
GetCurrentProcess
GetWindowsDirectoryA
CloseHandle
WriteProcessMemory
OpenProcess
TerminateProcess
lstrcpyA
CreateThread
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
GetModuleHandleA
DeleteFileA
GetCommandLineA
GetProcAddress
GetModuleFileNameA
CreateToolhelp32Snapshot
user32
ToAscii
wsprintfA
GetKeyboardState
MapVirtualKeyA
GetForegroundWindow
GetDesktopWindow
GetWindowDC
GetWindowRect
GetDC
ReleaseDC
FindWindowExA
PostMessageA
GetWindowTextA
ShowWindow
FindWindowA
SetWindowTextA
GetActiveWindow
gdi32
SelectObject
CreateCompatibleBitmap
BitBlt
GetObjectA
GetStockObject
SelectPalette
RealizePalette
DeleteDC
CreateCompatibleDC
GetDIBits
comdlg32
GetFileTitleA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
shell32
StrStrA
StrCmpNIA
ShellExecuteA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
shlwapi
PathFileExistsA
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ