Behavioral task
behavioral1
Sample
4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5.dll
Resource
win10v2004-20240221-en
General
-
Target
4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5.exe
-
Size
6.5MB
-
MD5
682b6ef619a4bb240c23ccf8bfb827ea
-
SHA1
4edfd57e367897f4d3535063f2113ac20dc2985c
-
SHA256
4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5
-
SHA512
b35b7170f97e1442b0adf24986ae253ec577f201742a77b2352b32d44e05bcaa78a7b303cf5d3bbb6d2c57e95992aa4637f5745140b14cebf8a7c8523e1b4ac4
-
SSDEEP
196608:TBaD0k+uX5w1HsD7Rm0HYc+3lcLAesgD97VxTwys:Na1s1HC4AxMwAiVxTwD
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5.exe
Files
-
4c30b85739743226d4c40bf6c25a1672de66ec2902ca85f2d36a2e043c3f9cf5.exe.dll windows:6 windows x64 arch:x64
cc31c556b4b3354e9a6d8d57a19bcd62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetAsyncKeyState
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
msvcp140
_Cnd_destroy_in_situ
dbghelp
StackWalk64
imm32
ImmSetCompositionWindow
d3dcompiler_47
D3DCompile
dwmapi
DwmGetColorizationColor
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-runtime-l1-1-0
_initialize_narrow_environment
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-stdio-l1-1-0
_fileno
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-filesystem-l1-1-0
_lock_file
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
strcmp
gdi32
CreateRectRgn
advapi32
RegQueryValueExW
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 538KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.5MB - Virtual size: 6.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ