wmplayer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648.exe
Resource
win10v2004-20240226-en
General
-
Target
032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648
-
Size
260KB
-
MD5
1c3c17ff43ac3bbd7f0d71950db94d80
-
SHA1
d7100b8073206b3de4e162cbb73607f67e20adb7
-
SHA256
032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648
-
SHA512
a3a16f24ccb445661e5b9328bb56fcd39f32d7c3c5216db585fb03acb06ae8e52c3844ca97cd2909db52392d52533070b17c71f9782c61bfefea154145dcc01b
-
SSDEEP
6144:slw9aywNfLKCHeBRP/rj3y2hCmzQdXiwgoGw3eem:ncNfLKCHARP/rj3xhVqXiw5uP
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648
Files
-
032ffde53e270fa26a1ef541ded419155e7a6b3f6a8207dc2e08c89a3fc54648.exe windows:5 windows x86 arch:x86
598a7f2f9e7f148a2238db75bc40f232
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
GetLastError
lstrlenW
CompareStringA
ExitProcess
FreeLibrary
SetErrorMode
GetStartupInfoA
GetProcAddress
lstrcatA
lstrcpyA
HeapFree
SetCurrentDirectoryA
CloseHandle
CreateMutexA
GetCommandLineW
MultiByteToWideChar
HeapAlloc
lstrlenA
GetVersion
GetCommandLineA
GetProcessHeap
SetThreadPriority
GetCurrentThread
LocalFree
LoadLibraryA
FormatMessageA
GetModuleHandleA
InterlockedExchange
LocalAlloc
RaiseException
user32
IsIconic
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxA
FindWindowA
SendMessageTimeoutA
ShowWindow
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 188KB - Virtual size: 492KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE