Behavioral task
behavioral1
Sample
c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95.exe
Resource
win10v2004-20240426-en
General
-
Target
c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95
-
Size
11.5MB
-
MD5
5db0ab7c0e7d241e719b69f17f6c3674
-
SHA1
593374537ccb85889c750d4e213eefbfa5ff5783
-
SHA256
c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95
-
SHA512
59a8254e4cb9c92a1206ae65bc9b817dfe9344eb86fdb3906ffdc754c17f5f0b4d790e1cd3e8be3dbbdb38ca8a19cd57b8ff647dc07d7ec1652b519502b6cc4d
-
SSDEEP
196608:YXe8Sc1fGqVoYfZsvxDzXvw718bbUDaXyvBxatASm9hWOQp3KfHTkf:YJz1O+Uv1z/w7Cb7+QA19hHQpC
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95
Files
-
c92576a3661c8cb159fc02d2676b2f05d7a3c54527605804456456cfae64be95.exe windows:6 windows x86 arch:x86
b477e5b89d55236865eb7b27f3e617fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ModifyMenuW
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
shell32
ExtractIconW
ole32
RegisterDragDrop
shlwapi
PathIsUNCW
winmm
PlaySoundW
comctl32
_TrackMouseEvent
imm32
ImmSetOpenStatus
gdiplus
GdipSetStringFormatLineAlign
msimg32
AlphaBlend
uxtheme
OpenThemeData
wininet
InternetQueryOptionW
oleacc
AccessibleObjectFromWindow
oledlg
OleUIPasteSpecialW
gdi32
GetObjectA
winspool.drv
GetJobW
advapi32
RegCloseKey
oleaut32
VariantChangeType
wtsapi32
WTSSendMessageW
Sections
.textbss Size: - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: - Virtual size: 10.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 11.4MB - Virtual size: 11.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ