Behavioral task
behavioral1
Sample
4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc.exe
Resource
win10v2004-20240226-en
General
-
Target
4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc
-
Size
4.7MB
-
MD5
2f6fb5b076ef9569db9463ced576e148
-
SHA1
eff1d37bccd7e8e38ff4c26037b5bef88809cf5d
-
SHA256
4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc
-
SHA512
59572d8bf7843f77eb886ad3e902806cbee693938e523bb1b8cf172fcc54495dcf0450e5fecd5c0826eaae6a7822aa6ecd723d0d3bb5a0c1ab562538053b16a7
-
SSDEEP
98304:2vV4DM7kL2KFNIyU0Wx34jz0FkdEnDyikcc0xPrPoz:1M7FKFOLx3C06wyikn0xPrPo
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc
Files
-
4fbd1a6ab89033b21911dbc67af54ed43ffffc4d0352875c670285e6373d38fc.exe windows:6 windows x86 arch:x86
4a59c01a0bb6ff988639223a292ccbdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFinalPathNameByHandleW
FindClose
CreateFileW
GetFileAttributesW
GetLastError
CloseHandle
GetCurrentProcessId
QueryDosDeviceW
SetLastError
GetEnvironmentVariableW
GetLogicalDriveStringsW
GetVolumePathNamesForVolumeNameW
FindFirstFileExW
FindNextFileW
GetCurrentProcess
MultiByteToWideChar
SetFilePointerEx
CreateProcessW
GetExitCodeProcess
FormatMessageW
LocalFree
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
IsWow64Process
LCMapStringEx
GetStartupInfoW
GetStdHandle
GetPriorityClass
LCMapStringW
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
WriteFile
GetFileSizeEx
FindFirstFileW
ReadFile
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
WriteConsoleW
GetFileType
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
GetCurrentThreadId
QueryPerformanceCounter
EncodePointer
DecodePointer
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
InitializeSListHead
RtlUnwind
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
TranslateMessage
MessageBoxW
DispatchMessageW
MsgWaitForMultipleObjects
PeekMessageW
GetProcessWindowStation
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
comctl32
ord17
wtsapi32
WTSSendMessageW
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ