Behavioral task
behavioral1
Sample
30a78770615c6b42c17900c4ad03a9b708dc2d9b743bbdc51218597518749382.exe
Resource
win7-20240221-en
General
-
Target
30a78770615c6b42c17900c4ad03a9b708dc2d9b743bbdc51218597518749382
-
Size
6.0MB
-
MD5
c024e5163ab6dd844813bf0d9a6f082b
-
SHA1
724081c323828f9c0547e3f21c0969632a59b42c
-
SHA256
30a78770615c6b42c17900c4ad03a9b708dc2d9b743bbdc51218597518749382
-
SHA512
f9410c691ca4f1ef8ca07b809e6f489dda975d3e8b721da8cce2c1aa12f469d024abf7630f5242d4ee023753390ee3441f9ccc505250803460c5965c8525455d
-
SSDEEP
98304:oEupHBqdbiPFUZ4DPsdhFjGKzNn/lSSYpoVzda2XmTiDa6Cpi43Jo3KSjt3fVO4L:Vuty2lczVgK57LsiAG35jt91hnG
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 30a78770615c6b42c17900c4ad03a9b708dc2d9b743bbdc51218597518749382
Files
-
30a78770615c6b42c17900c4ad03a9b708dc2d9b743bbdc51218597518749382.exe windows:5 windows x64 arch:x64
baada98051ba46e8d53389feca96476e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
CryptReleaseContext
A_SHAUpdate
cabinet
ord14
crypt32
CertGetNameStringW
cryptdll
CDGenerateRandomBits
dnsapi
DnsQuery_A
fltlib
FilterFindFirst
netapi32
NetRemoteTOD
I_NetServerAuthenticate2
ole32
CoTaskMemFree
oleaut32
VariantInit
rpcrt4
RpcMgmtEpEltInqBegin
shlwapi
PathCombineW
samlib
SamConnect
secur32
LsaFreeReturnBuffer
shell32
CommandLineToArgvW
user32
IsCharAlphaNumericW
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
userenv
DestroyEnvironmentBlock
version
GetFileVersionInfoSizeW
hid
HidD_GetFeature
setupapi
SetupDiDestroyDeviceInfoList
winscard
SCardDisconnect
winsta
WinStationEnumerateW
wldap32
ord96
msasn1
ASN1_CloseModule
ntdll
NtQuerySystemInformation
kernel32
GetVersionExA
GetVersionExW
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 882KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 636B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ