_�����ӳ���
Behavioral task
behavioral1
Sample
0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff.dll
Resource
win10v2004-20240226-en
General
-
Target
0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff
-
Size
3.5MB
-
MD5
2cb62928e9f7182261bd1037714fceff
-
SHA1
99709879740f8c8c182d22187b9a1e0d33c52b64
-
SHA256
0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff
-
SHA512
82a135b20468368e1992ff6c6a614c5f0629c7f8def78102218de8b2536a5e8fc97fead57dd8c8820002e105414f780cc03a5cc7027de4963bc80f26a41886ae
-
SSDEEP
49152:inWYfbZ11V7wZsx4TjStBomi+46KrXISaF7QPL7WibrI09H2+Kezv9rE0ntuSONF:inTF17UZtStCNHDroKWiLf9DtZONwg
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff
Files
-
0bbc6c0956fb4438e281d7b4ee1e3ebf9734cf2e505d1d08f1479781e54dd4ff.dll windows:5 windows x86 arch:x86
9e50a838e0ce1dc9024977dde32d9226
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
midiOutPrepareHeader
ws2_32
recvfrom
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
IsZoomed
CharUpperBuffW
gdi32
SetWindowExtEx
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
OleInitialize
oleaut32
LoadTypeLi
comctl32
ord17
comdlg32
GetSaveFileNameA
wtsapi32
WTSSendMessageW
Exports
Exports
Sections
.text Size: - Virtual size: 764KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ