Static task
static1
Behavioral task
behavioral1
Sample
loader_crackedrusta.vmp.exe
Resource
win10v2004-20231222-en
General
-
Target
loader_crackedrusta.vmp.exe
-
Size
6.6MB
-
MD5
2482db2655a9e798cbcf48e1bb62ed07
-
SHA1
67b3bf86eb18f9d59852c8b2403b8e1947a4de1f
-
SHA256
2c204fbe89491254127c5b3aff841ff5f5e1e70c609a3f0867edb993f6aecddb
-
SHA512
7abc4447681e7725af9f476798f5dae592ba8387e806cd29b031c8bdd33be535d0fdea9e6b8f01a1f9a196e9a32831551002cea18dcb6867cd3331ed7210be6b
-
SSDEEP
98304:KxK4YhZ3QNuO5uLWVXxmMs2aK390SEukaRwgWGKCQ6hQCgFAnfsLAm9:KxK4YXAAGuiVXGtFn5aVdQ6NgFAfsci
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader_crackedrusta.vmp.exe
Files
-
loader_crackedrusta.vmp.exe.exe windows:6 windows x64 arch:x64
1497f9c33fd10e425104ca80a711f486
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryA
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClientRect
CharUpperBuffW
advapi32
FreeSid
imm32
ImmSetCompositionWindow
msvcp140
?always_noconv@codecvt_base@std@@QEBA_NXZ
ntdll
NtRaiseHardError
urlmon
URLDownloadToFileA
d3d9
Direct3DCreate9
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-stdio-l1-1-0
_wfopen
api-ms-win-crt-string-l1-1-0
isprint
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-time-l1-1-0
strftime
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
sqrtf
ws2_32
recvfrom
wldap32
ord79
crypt32
CryptDecodeObjectEx
normaliz
IdnToAscii
shell32
ShellExecuteA
Sections
.text Size: - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.\JP Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BfG Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ugN Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ