Behavioral task
behavioral1
Sample
c8addfe55a2ad91ae360503a19cc2209.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c8addfe55a2ad91ae360503a19cc2209.dll
Resource
win10v2004-20240226-en
General
-
Target
c8addfe55a2ad91ae360503a19cc2209
-
Size
116KB
-
MD5
c8addfe55a2ad91ae360503a19cc2209
-
SHA1
714a28b1b4e5875a5299f76699df75370af997df
-
SHA256
7f433da8b783af288c93556ba27c4598483148e486f038968b81a5f8f2427b58
-
SHA512
a681492a3d5f4fb8562bd2a50d75bad24b99732deccb8457c9f6c27909c62852f2a092cf52814bf214dc6aa3fed29c3979cfb0b390747dddfeff388e15d0c58f
-
SSDEEP
1536:YEfzAm4wET0BIL91W+BvvBCpLM++JUHWWs1O3R+Cj3gFN8PsSQgsgihkSLR5iu24:YECT0BIPW+vIM+aI6O3InmZP0t/ieUI
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8addfe55a2ad91ae360503a19cc2209
Files
-
c8addfe55a2ad91ae360503a19cc2209.dll windows:4 windows x86 arch:x86
5ba8bfb0a654cf435b86de029abb9f14
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
ReadProcessMemory
GetCurrentProcess
SetLastError
VirtualProtect
FlushInstructionCache
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
OutputDebugStringA
GetCommandLineA
GetVersion
RtlUnwind
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
RaiseException
InterlockedDecrement
InterlockedIncrement
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
OpenFileMappingA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
FindWindowA
GetDC
ReleaseDC
GetAsyncKeyState
gdi32
Rectangle
CreateSolidBrush
CreatePen
GetStockObject
SetBkMode
SetTextColor
CreateFontA
DeleteObject
TextOutA
SelectObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ