ServiceMain
Behavioral task
behavioral1
Sample
be14fc3b584a5c18f59adc520478caa6.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be14fc3b584a5c18f59adc520478caa6.dll
Resource
win10v2004-20240226-en
General
-
Target
be14fc3b584a5c18f59adc520478caa6
-
Size
38KB
-
MD5
be14fc3b584a5c18f59adc520478caa6
-
SHA1
e5307f0604dbc08c8bae3fb911e15261453a79b6
-
SHA256
f024ed8fa47388be00b8937825c7b154cc2eb2f55b3e9c5debeb82bf0316f20e
-
SHA512
ccc0a74f06423207d68dfb5227fb2a9753ac881ddf178fd5223d78bf5c9763820ac212746032250d46787d3ffea8aeb286db827e3d7753c7324fc4668844672e
-
SSDEEP
768:YjA88lPX9PXEPXRj4vsXTZ12lnF+56Ev4vrC7b/:kePtPUPx31k1F+6Ev/
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be14fc3b584a5c18f59adc520478caa6
Files
-
be14fc3b584a5c18f59adc520478caa6.dll windows:4 windows x86 arch:x86
7b39805e5fefe28d88453756da6153ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DeleteFileA
Sleep
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
DisableThreadLibraryCalls
CreateThread
FreeLibraryAndExitThread
ExitProcess
ReadFile
SetFilePointer
FreeLibrary
GetSystemDirectoryA
GetStartupInfoA
WaitForSingleObject
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
OpenProcess
MultiByteToWideChar
lstrcmpA
GetVersion
DeviceIoControl
GetCurrentProcessId
GetProcAddress
lstrcpyA
lstrcatA
lstrlenA
LoadLibraryA
CreateProcessA
user32
wsprintfA
CharUpperA
advapi32
RegOpenKeyExA
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegCloseKey
DeleteService
OpenSCManagerA
ControlService
wininet
InternetReadFile
HttpQueryInfoA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
ws2_32
inet_ntoa
gethostbyname
WSAStartup
inet_addr
shlwapi
SHDeleteKeyA
msvcrt
_adjust_fdiv
malloc
_initterm
free
_except_handler3
strstr
strchr
atoi
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
sprintf
??3@YAXPAX@Z
Exports
Exports
Sections
.text Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.delete Size: 512B - Virtual size: 746B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pklstb Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 4KB - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ