Behavioral task
behavioral1
Sample
a1dabee55a5be6215cb878eaa446297f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a1dabee55a5be6215cb878eaa446297f.exe
Resource
win10v2004-20231215-en
General
-
Target
a1dabee55a5be6215cb878eaa446297f.exe
-
Size
124KB
-
MD5
a1dabee55a5be6215cb878eaa446297f
-
SHA1
e555a80052ab2efa7bd2d3812ddd74d5e79bbfea
-
SHA256
7de295451280b0ee5d90c6709f39d641f81d446b34d35b20422acb3919048ce9
-
SHA512
06be1c66dafe3e59e1600120e2d020d23c4e41a26d33e6e26e32e5cb058478bb4bb9d4d1ba74f02ed4c2b6f905c95e9cde536b57f48b9e4c03708da73b37f42b
-
SSDEEP
3072:MsfUOo0WR627ugGLBpgZOY2BvuxssylF9vrxyo6SVoAV6:lMOonR62qgGLBpg4B8slF91D63AV
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1dabee55a5be6215cb878eaa446297f.exe
Files
-
a1dabee55a5be6215cb878eaa446297f.exe.exe windows:4 windows x86 arch:x86
d334b9c841ee8a7ea181c93c82f4202e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_strlwr
_strnicmp
_itoa
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
strstr
strncpy
_CxxThrowException
__CxxFrameHandler
strcmp
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
memset
strchr
strncat
strcat
tolower
toupper
_ftol
srand
rand
strcpy
_except_handler3
strlen
_stricmp
kernel32
GetStartupInfoA
MultiByteToWideChar
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
DeleteFileA
SetFileAttributesA
CloseHandle
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
GetTickCount
lstrcatA
GetSystemDirectoryA
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
MoveFileA
SetFileTime
WideCharToMultiByte
SystemTimeToFileTime
SetFilePointer
WriteFile
CreateFileA
lstrcmpiA
GetModuleFileNameA
Sleep
WaitForSingleObject
CreateEventA
OpenEventA
SetUnhandledExceptionFilter
GetCommandLineA
LocalFileTimeToFileTime
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfA
MessageBoxA
advapi32
GetUserNameA
GetServiceKeyNameA
StartServiceA
ControlService
OpenSCManagerA
CreateServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
shlwapi
SHDeleteKeyA
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ