Behavioral task
behavioral1
Sample
8ff3cee3eb06229dd932256e10e67431.exe
Resource
win7-20240221-en
General
-
Target
8ff3cee3eb06229dd932256e10e67431.exe
-
Size
5.5MB
-
MD5
8ff3cee3eb06229dd932256e10e67431
-
SHA1
6e8b5ce52148cccdc9570ff67e059f48c90fccfa
-
SHA256
65d4936f68f29cb7730436fcbf987aa2ee7a5c3a9d2a45f40fd2cb7e37e81640
-
SHA512
72ef16a155df452e912d82474a947a652a2570022bb4a65ad5a124d26b01130790a35d33920cffe7e9db758d5ebc5f39d2b9e8ebd8def69925fa96d94e0c0449
-
SSDEEP
98304:SXtuV2KxgKn2OkNuQXwWDctUcFygm34BnwChAKW44QH:0uVXxgi2vcQgLueAKa
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ff3cee3eb06229dd932256e10e67431.exe
Files
-
8ff3cee3eb06229dd932256e10e67431.exe.exe windows:6 windows x86 arch:x86
12b8a8f4dddb7dfbc6f0bf69be3f8528
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
oleaut32
SysAllocString
ole32
CoCreateInstance
user32
GetDC
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
BitBlt
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ