Behavioral task
behavioral1
Sample
f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176.exe
Resource
win10v2004-20240226-en
General
-
Target
f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176
-
Size
839KB
-
MD5
9cfee7c8ef7d7c01d31472eff32caaed
-
SHA1
0f082da78f85c5ff7b447f98c40bd1eb25ec6830
-
SHA256
f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176
-
SHA512
9cdc803b0616ab26b6e3c8d38c582c87d3e2e0d5a5fc3726e53d558c54adb26902abbd2dd0e47a4528d0fda4191f9f7d29ad4f9aa559f3003ad14d5d8881e2ec
-
SSDEEP
12288:su7LqTVZhphlxV+3303WfZ2l71enBHjheDwk/WaQ/QRNFSQcl84T7S+fOthKiXZq:smYptV+3E3WfZC7IDhkDX284T1OLDUL
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176
Files
-
f5c7086322b0695a3791cf684e9e7e1307aa870b7cb221d1af7a13a9e57ee176.exe windows:5 windows x86 arch:x86
81a19e4c4aaa42ec67f82e70b56910b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcBindingFree
RpcStringFreeW
RpcBindingFromStringBindingW
RpcStringBindingComposeW
NdrClientCall2
libcurl
curl_slist_free_all
curl_easy_cleanup
curl_easy_getinfo
curl_easy_perform
curl_slist_append
curl_easy_setopt
curl_easy_init
curl_global_init
curl_global_cleanup
mfc100u
ord11123
ord8179
ord10412
ord3627
ord2981
ord2980
ord2756
ord5556
ord12606
ord2417
ord11163
ord8347
ord10058
ord10081
ord6711
ord2407
ord9525
ord948
ord381
ord6344
ord4513
ord11495
ord306
ord903
ord4512
ord294
ord11683
ord4151
ord11801
ord7876
ord13208
ord6661
ord3436
ord2617
ord7901
ord3749
ord2748
ord8266
ord5809
ord921
ord5855
ord1987
ord3446
ord5862
ord10122
ord1944
ord2030
ord4355
ord7932
ord13047
ord7301
ord6346
ord385
ord5846
ord970
ord880
ord1282
ord5801
ord950
ord2763
ord3174
ord3971
ord1734
ord7911
ord12951
ord3978
ord6713
ord11164
ord8509
ord5227
ord13415
ord11838
ord7524
ord13398
ord2135
ord1476
ord11353
ord2620
ord1479
ord7914
ord4290
ord1861
ord4511
ord3846
ord2064
ord2068
ord2119
ord8277
ord7973
ord11494
ord4805
ord2878
ord2062
ord4802
ord3397
ord11940
ord4360
ord7006
ord7929
ord2136
ord285
ord261
ord8372
ord6036
ord13391
ord4811
ord8497
ord5264
ord2629
ord1450
ord6096
ord2185
ord12186
ord7512
ord3261
ord2155
ord868
ord1269
ord10969
ord11374
ord2542
ord1934
ord2614
ord286
ord1312
ord1313
ord917
ord8264
ord2746
ord6318
ord296
ord266
ord265
ord280
ord1310
ord13412
ord13207
ord11516
ord12413
ord13396
ord2057
ord11330
ord422
ord980
ord3628
ord5652
ord9447
ord6869
ord890
ord1292
ord7176
ord1986
ord1895
ord12753
ord6140
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord4086
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord902
ord1298
ord8599
ord12948
ord1212
ord788
ord2528
ord2077
ord320
ord10960
ord979
ord421
ord6870
ord1266
ord897
ord1296
ord6117
ord8346
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord5468
ord4623
ord7548
ord7624
ord1905
ord4794
ord4645
ord5143
ord4901
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord7903
ord3754
ord4416
ord4383
ord5900
ord3482
ord2188
ord4359
ord13181
ord4810
ord5828
ord293
ord4139
ord1314
ord4379
ord4413
ord4434
ord4392
ord4421
ord721
ord1174
ord278
ord1309
ord851
ord7636
ord1490
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11210
ord8112
ord13380
ord10937
ord3402
ord11081
ord8273
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2418
ord7385
ord2884
ord2887
ord12610
ord5558
ord2844
ord3763
ord1300
ord13253
ord2089
msvcr100
_initterm
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
memmove
isspace
free
sprintf_s
sscanf
strchr
strncmp
div
wcscat_s
_time64
_localtime64_s
wcsftime
_mktime64
_vswprintf
fclose
fread
_wfopen_s
_wcsicmp
isalnum
_wtoi
malloc
__CxxFrameHandler3
_CxxThrowException
memset
fprintf
_vsnprintf_s
memcpy
tolower
isalpha
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
strstr
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_purecall
wcsstr
wcsncpy_s
__wargv
__argc
memmove_s
vsprintf_s
_wcsdup
swprintf_s
memcpy_s
atoi
memchr
strcat_s
rand
srand
sprintf
_snwprintf
ftell
_wfopen
strcpy_s
fseek
_wstat64i32
_snwprintf_s
??0exception@std@@QAE@ABQBD@Z
kernel32
SetEvent
WaitForSingleObject
DeleteFileW
CreateDirectoryW
GetTickCount
HeapAlloc
GetProcessHeap
HeapFree
GetVersionExW
DeviceIoControl
GetModuleFileNameA
InterlockedDecrement
WritePrivateProfileStringW
Sleep
GetExitCodeThread
TerminateThread
GetPrivateProfileStringW
InterlockedIncrement
LockResource
VerifyVersionInfoW
GetWindowsDirectoryW
CopyFileW
CreateMutexW
OpenEventW
lstrcpynW
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
EncodePointer
MultiByteToWideChar
GetPrivateProfileIntW
GetLastError
FormatMessageW
LocalAlloc
lstrlenW
LocalFree
CreateProcessW
WaitForMultipleObjects
GetExitCodeProcess
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
WTSGetActiveConsoleSessionId
GetFileAttributesW
SizeofResource
CreateEventW
GetModuleFileNameW
CreateFileW
WideCharToMultiByte
GetProcAddress
GetModuleHandleW
lstrlenA
IsProcessorFeaturePresent
GetCurrentProcess
ProcessIdToSessionId
GetSystemDirectoryW
FileTimeToSystemTime
DecodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
LoadResource
FindResourceW
GlobalAlloc
ResumeThread
GlobalUnlock
GlobalLock
CloseHandle
VerSetConditionMask
SetFileAttributesW
FileTimeToLocalFileTime
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CopyRect
SetWindowTextW
GetWindowRect
GetParent
InflateRect
SendMessageW
SetCursor
InvalidateRect
ReleaseDC
GetDC
SetRect
ModifyMenuW
GetCursorPos
LoadCursorW
MessageBoxW
PostMessageW
wsprintfW
GetWindowLongW
SetWindowLongW
UpdateLayeredWindow
GetSysColorBrush
SystemParametersInfoW
SetWindowPos
SetTimer
SetForegroundWindow
KillTimer
PtInRect
SetCapture
ReleaseCapture
GetClientRect
SetWindowRgn
ExitWindowsEx
RegisterWindowMessageW
BroadcastSystemMessageW
LoadIconW
RegisterDeviceNotificationW
IsWindowVisible
LoadMenuW
GetSubMenu
EnableWindow
gdi32
SelectObject
DeleteDC
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateRoundRectRgn
DeleteObject
advapi32
ImpersonateLoggedOnUser
GetUserNameW
RevertToSelf
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
ChangeServiceConfigW
StartServiceW
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegSetValueExW
RegQueryValueExA
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExW
CryptGetUserKey
CryptReleaseContext
CryptExportKey
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashW
CryptAcquireContextW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegSetValueExA
RegDeleteValueW
CryptEnumProvidersW
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptGenKey
CryptSetKeyParam
CryptGetKeyParam
CryptGetProvParam
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ole32
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
CLSIDFromProgID
CoInitialize
CoCreateGuid
CreateStreamOnHGlobal
oleaut32
SysAllocString
SysFreeString
VariantInit
SafeArrayGetElement
VariantClear
GetErrorInfo
gdiplus
GdipGetImageWidth
GdipCloneBrush
GdipLoadImageFromFile
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipGetImageHeight
GdipGetFontCollectionFamilyList
GdipCloneFontFamily
GdipFree
GdipAlloc
GdipDeleteFontFamily
GdipGetFontCollectionFamilyCount
GdipNewInstalledFontCollection
GdipSetSmoothingMode
GdipCreateFromHDC
GdipSetTextRenderingHint
GdipCreateSolidFill
GdipGetFamilyName
GdipDeleteBrush
GdipSetWorldTransform
GdipRotateMatrix
GdipFillRectangleI
GdipDrawImageRectRectI
GdipCreateFontFamilyFromName
GdipCreateFont
GdipDeleteFont
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetSolidFillColor
GdipTranslateMatrix
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipDrawString
GdipDeleteGraphics
GdipCreateLineBrushI
GdipSetLinePresetBlend
GdipCreatePen1
GdipDeletePen
GdipDrawRectangleI
GdipReleaseDC
GdipDrawLineI
GdiplusStartup
GdiplusShutdown
GdipDrawImagePointsI
GdipDrawImageRectI
GdipDrawArcI
GdipFillPieI
GdipMeasureString
GdipCreateMatrix
GdipDeleteMatrix
ws2_32
WSAStartup
msvcp100
?_Raise_handler@std@@3P6AXABVexception@stdext@@@ZA
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
??1_Container_base12@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
userenv
LoadUserProfileW
crypt32
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertVerifyTimeValidity
CertGetNameStringW
CertStrToNameW
CertOpenSystemStoreA
CertFindCertificateInStore
CertFreeCertificateContext
CertCloseStore
CertCreateCertificateContext
CertGetNameStringA
CertOpenSystemStoreW
CryptBinaryToStringA
CryptEncodeObject
CryptBinaryToStringW
CryptSignAndEncodeCertificate
CryptExportPublicKeyInfo
CertAddCertificateContextToStore
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
iphlpapi
GetAdaptersInfo
isignwrap
?Init@CiSignWrap@@QAE_NPADH0@Z
?ImportCertData@CiSignWrap@@QAE_NPAD0000@Z
?GetLastError@CiSignWrap@@QAEPADPAD@Z
?FreeMemory@CiSignWrap@@QAEXPAX@Z
?CreateX509ReqData@CiSignWrap@@QAEPADPADHHHH000@Z
?UnInit@CiSignWrap@@QAEXPAD@Z
??0CiSignWrap@@QAE@XZ
netapi32
NetApiBufferFree
NetUserGetLocalGroups
setupapi
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
Sections
.text Size: - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 781KB - Virtual size: 780KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 56KB - Virtual size: 566KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ