Behavioral task
behavioral1
Sample
fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.exe
Resource
win7-20240220-en
General
-
Target
fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.zip
-
Size
5.3MB
-
MD5
ff986fe8213139c7aeb4b23a3f8bfa7d
-
SHA1
4387a56ff96900cb60376eddb08bf3c5f11bf9be
-
SHA256
ed716c044404c715d6fc281e4f02d216492139c7559cc526d399984205932b22
-
SHA512
67c8f8b3b0475d6f9c280dbe1949b1bf56ba990412ad944edf61c8ca68da3e69bebd4819c8df6eea964b7be7ab9d965821a3552afd0c8ea8244d197468a400b8
-
SSDEEP
98304:8ca0pKRTreWmV/DlsVfC025YZPyHonKgRUeHf+/qe9esLWTIysy3ik:8yKxCWmV/50SVq2J/Ysakyr3N
Malware Config
Signatures
-
resource yara_rule static1/unpack001/fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.exe vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.exe
Files
-
fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.zip.zip
Password: infected
-
fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568.exe.exe windows:6 windows x86 arch:x86
Password: infected
89c8abd38fd3ffc06ee06d01f9b3cbbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
ole32
CoCreateInstance
oleaut32
SysAllocString
user32
CloseClipboard
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
BitBlt
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ