Behavioral task
behavioral1
Sample
c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6.exe
Resource
win10v2004-20240508-en
General
-
Target
c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6
-
Size
3.5MB
-
MD5
b5cc94d4f26de91eda2cf1349b21a53b
-
SHA1
22ee4a58750f07050a8757ea2ef09e7ed7d50f95
-
SHA256
c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6
-
SHA512
39c160bd5a22033ce292071df8a0fc3c4a2727d654764c5c271eda6551425995f1e46411c46d35919e6cfaeeadb0a18a467211c59791527b23012579bbff3b90
-
SSDEEP
98304:G10GIsGeAuSbApqvC4Yz1mosaYEKJIcOG9Lh80tLK:sAu2AUvCHz1moBQAG9LhpB
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6
Files
-
c2f6f297d6bac502bcdd5267de403724b4bd78adbed9c9452e359b71799eb6c6.exe windows:5 windows x86 arch:x86
7c16214c092ec2dcfa6bfaab4ef74f0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmIsIME
ws2_32
gethostbyaddr
kernel32
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CloseClipboard
CharUpperBuffW
gdi32
CreateFontIndirectA
ole32
CoInitialize
winmm
waveOutGetVolume
ddraw
DirectDrawCreate
dsound
ord1
comdlg32
ChooseColorA
shell32
SHGetPathFromIDListA
wtsapi32
WTSSendMessageW
advapi32
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
Sections
.text Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
+!i~�u� Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ