Static task
static1
Behavioral task
behavioral1
Sample
41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d.exe
Resource
win10v2004-20240226-en
General
-
Target
41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d
-
Size
203KB
-
MD5
3b11ca8f9c9cab4350e7ec3dfb25dd08
-
SHA1
db424cf8a5db296311234106b4f1740bb5f8248b
-
SHA256
41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d
-
SHA512
d56b189fdab8eb4938fafb9a8f844c02d7e37deba11e6b4af0497875ed7fd844c7ba68d939242b253572ded17c44c4bdfc3d3d77d91350ac9d7228ea4de327ca
-
SSDEEP
3072:bwY3fIeBfbyt7GVMgq0sKPf24/KASZ1d6axe8R1:kEfbH+gq5K24/zuske8R1
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d
Files
-
41c2385346f5fbb196485c50c7501c79895f472c53109d79907d255ea2013e7d.exe windows:4 windows x86 arch:x86
4862b30c2cd57dae5a702462f93872da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CloseHandle
CreateFileA
OutputDebugStringA
ExitProcess
WinExec
WriteFile
LoadLibraryA
GetSystemTime
SetFilePointer
CreateProcessA
GetModuleHandleA
HeapAlloc
lstrcmpiA
GetVersionExA
GetProcAddress
GetTickCount
lstrlenA
GetTempPathA
GetModuleFileNameA
LCMapStringA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
GetLastError
TerminateProcess
GetCurrentProcess
HeapFree
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
iphlpapi
GetAdaptersInfo
ws2_32
send
WSAStartup
gethostbyname
socket
htons
inet_addr
connect
recv
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ