E:\dome\VS2022\LostKR\LostKr\x64\Release\LostKr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1e795cff83246f3ee36b8efe138cd6baf65684b07d04923c3490cc73d40aaec8.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1e795cff83246f3ee36b8efe138cd6baf65684b07d04923c3490cc73d40aaec8.dll
Resource
win10v2004-20240226-en
General
-
Target
20683f3d96abf8940226c14bcafd491c.bin
-
Size
34KB
-
MD5
38a22f6263fa714498c8529636570e13
-
SHA1
060ff5c1ded2d0904d0fb73bffe9c7ea66e8e5dc
-
SHA256
4f83df4ad7e8150d181f4a09a5c96d10b6798d585a09808f8366dc38a135e8a9
-
SHA512
181822443e82795a6c05cdfd1c66ce2659413e0a5b16dd86a6da0e0926e74d3580176631b7c83a49ba00b1a9beece427a2cd78c8b887edf6f10e22dfc3040f4f
-
SSDEEP
768:/7+bOGqk9QO6bmOpsGr6NKywQPk/ZRzKfOaChfDaDJ+NB3ftmHoX:/CbOVtl6NK/wkxRiChDp3lm0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1e795cff83246f3ee36b8efe138cd6baf65684b07d04923c3490cc73d40aaec8.exe
Files
-
20683f3d96abf8940226c14bcafd491c.bin.zip
Password: infected
-
1e795cff83246f3ee36b8efe138cd6baf65684b07d04923c3490cc73d40aaec8.exe.dll windows:6 windows x64 arch:x64
Password: infected
ebab41e756341412add1c0b62396dc83
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualQuery
Sleep
IsBadReadPtr
GetCurrentProcessId
FreeLibraryAndExitThread
RtlAddFunctionTable
CreateFileMappingA
MapViewOfFile
CloseHandle
UnmapViewOfFile
CreateEventA
SetEvent
WaitForSingleObject
ResetEvent
CreateThread
OutputDebugStringA
GetModuleHandleA
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
RtlCaptureContext
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleFileNameA
user32
RegisterWindowMessageA
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
PostMessageA
SetForegroundWindow
SendMessageTimeoutA
FindWindowExA
GetWindowTextA
IsWindowVisible
advapi32
RegSetValueExA
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
__std_type_info_destroy_list
memset
_CxxThrowException
strstr
wcsstr
__std_exception_destroy
__std_exception_copy
memmove
__C_specific_handler
memcpy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_seh_filter_dll
_initterm
_crt_atexit
_configure_narrow_argv
_initialize_narrow_environment
_execute_onexit_table
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_cexit
_invalid_parameter_noinfo
_errno
_initialize_onexit_table
api-ms-win-crt-string-l1-1-0
strcat_s
_stricmp
wcscpy_s
strcpy_s
api-ms-win-crt-math-l1-1-0
sqrt
round
pow
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
Exports
Exports
VMProtectSDK32
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ