Behavioral task
behavioral1
Sample
Crack.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Crack.exe
Resource
win10v2004-20240221-en
General
-
Target
Crack.exe
-
Size
1.2MB
-
MD5
67aefaff80fad6a983a858336323a8b3
-
SHA1
922c5f016f6bcdba39a7e75a27b3a15a3c23e0c8
-
SHA256
f67563007c6b682208c625c675d066d9080c0804c7dfe4c685ad81dc0e0b3eb6
-
SHA512
03fd8cdbbb319a61f8400e6412ab2e7122eea86b6f80dd92dddd12d42ec5bd51dda211835ce79a38942ef28a17ebf31d26bb9c7a7d8c6b94b71b06ec08b0d3de
-
SSDEEP
24576:ZdnvFivSLMZFsXLVr7xBO4Aoom+ZfGaiyxMVxi+AQisUItcVWhMMwY:o6LMZFsXJJBO9ZNZX3uxizQkVWTw
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Crack.exe
Files
-
Crack.exe.exe windows:5 windows x86 arch:x86
645bf3dc6d3b69c14fc3333fa46c4257
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
MessageBoxW
advapi32
OpenProcessToken
msvcp100
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
msvcr100
__set_app_type
Sections
.text Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ