Behavioral task
behavioral1
Sample
00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a.exe
Resource
win10v2004-20240508-en
General
-
Target
00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a
-
Size
2.9MB
-
MD5
57176a7bf86e29b67512914c2e605a74
-
SHA1
fb0c8d54b5871af1f69f7fb67df4fe86d986b8a4
-
SHA256
00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a
-
SHA512
6e19544826088d8bdd6f0ef4e79e4fb5dc2c963354045f19d4eee8f41d4f4829d0e704bafb9bb989a4dc15c122943ca81fdf70a80584ec630c9a56e913261e72
-
SSDEEP
49152:UhXSOM612B0zmEohX4VEe4/bDMJn+c8d23Gp1KLcsTqgvrapaOlnOo5AO:UsOF9zHomVEebJjkaLcsTdaXOoK
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a
Files
-
00c0bbafd7404d1c8b2d59c3384c4b0bb10e4527c3d0e1b1b96f274c7bbf392a.exe windows:5 windows x86 arch:x86
4a69c67d03dabb918c630dc486848150
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSACleanup
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
DestroyAcceleratorTable
CharUpperBuffW
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
ord17
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 586KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.wxy Size: - Virtual size: 1011KB
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 2.9MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ