exportedHeapusageDiagnostic
Static task
static1
Behavioral task
behavioral1
Sample
82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004.exe
Resource
win10v2004-20240611-en
General
-
Target
82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004
-
Size
690KB
-
MD5
381e65dd3a7e805aca769a14cab76f7f
-
SHA1
766d90c48fac341dcd97b64cec5a880220c83c41
-
SHA256
82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004
-
SHA512
a67052e73fb5b5bebc318690804b1e6282aeeba4dd971497c29d2bb6f06a95e2f4acf4b923c99c86506183b310b4bd5c1aa6e8da5ce11678ebf95dca87aab0b3
-
SSDEEP
12288:oZaWmMGhs0MZc1J2wWEywrQE80BbUHCXiPz5aacrcSpyeoK+yn2kY+pUZQWXa:dMiMZ2plyOQiBSPzQacQSweoD8xpUZjK
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004
Files
-
82468f22209913d2812dfb0a2db44292333725e57a8d2e399034366a2c0ee004.exe windows:6 windows x86 arch:x86
20bf27f92459606f9fba05f001a0e440
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
inet_addr
htons
WSAGetLastError
connect
WSACleanup
WSAStartup
shutdown
setsockopt
send
recv
closesocket
kernel32
WritePrivateProfileStringW
GlobalAddAtomW
MulDiv
EncodePointer
GetSystemDirectoryW
GlobalFindAtomW
GlobalFlags
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalAlloc
LocalReAlloc
GetCurrentDirectoryW
CompareStringW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
DeleteFileW
GetFullPathNameW
SetEndOfFile
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExW
GetPrivateProfileStringW
SetFileAttributesW
SystemTimeToTzSpecificLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetPrivateProfileIntW
lstrcmpW
lstrcmpA
WriteConsoleW
GlobalDeleteAtom
ResumeThread
SuspendThread
CreateEventW
FreeResource
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
ResetEvent
DefineDosDeviceA
GetProfileStringA
CopyFileA
DeviceIoControl
CreateFileA
LoadLibraryA
GetProcessTimes
GetStartupInfoW
CreateProcessW
Beep
SetEnvironmentVariableA
GetEnvironmentVariableA
OpenMutexW
WaitForSingleObject
ReleaseMutex
GetVolumeInformationW
GetFileAttributesW
GetDiskFreeSpaceW
GlobalFree
GetPriorityClass
SetThreadPriority
GetCurrentThread
GetCurrentProcess
GetCurrentThreadId
SetEvent
CreateEventA
Process32NextW
OutputDebugStringW
LCMapStringW
GetStringTypeW
GetCPInfo
OpenEventA
ReleaseSemaphore
RtlUnwind
SetStdHandle
GetFileType
GetModuleHandleExW
GetDriveTypeW
PeekNamedPipe
GetTimeZoneInformation
FreeLibraryAndExitThread
GetCommandLineA
HeapQueryInformation
Process32FirstW
CreateToolhelp32Snapshot
ExitThread
CreateThread
FlushFileBuffers
MoveFileExW
GetCommandLineW
GetACP
WideCharToMultiByte
MultiByteToWideChar
VirtualFree
VirtualAlloc
CloseHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
CreateFileW
GetLocalTime
LoadLibraryW
FormatMessageW
FormatMessageA
LocalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryExW
GetProcAddress
FreeLibrary
GetVersionExW
FindNextFileW
FindFirstFileW
FindClose
Sleep
DeleteCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
FindResourceW
SizeofResource
LockResource
LoadResource
AllocConsole
SetConsoleTitleW
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
GetStdHandle
GetModuleHandleW
GetTickCount
ExitProcess
GetCurrentProcessId
GetDateFormatW
GetTimeFormatW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateDirectoryW
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperW
KillTimer
SetTimer
GetSysColorBrush
RealChildWindowFromPoint
IsDialogMessageW
ShowWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
GetWindow
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
MapWindowPoints
AdjustWindowRectEx
GetWindowTextW
RemovePropW
GetPropW
SetPropW
GetScrollPos
RedrawWindow
SetForegroundWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPlacement
GetWindowPlacement
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
CopyRect
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
TabbedTextOutW
GrayStringW
DrawTextExW
UnhookWindowsHookEx
GetMenuItemID
GetSubMenu
GetLastActivePopup
PostQuitMessage
CallNextHookEx
SetWindowsHookExW
ValidateRect
IsWindowVisible
DispatchMessageW
TranslateMessage
GetMessageW
GetDesktopWindow
SetActiveWindow
IsWindowEnabled
GetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
IsWindow
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
GetFocus
GetParent
OffsetRect
SetRectEmpty
SendDlgItemMessageA
wsprintfA
GetCursorPos
GetForegroundWindow
TrackPopupMenu
SetMenuItemBitmaps
GetMenuItemCount
EnableMenuItem
CheckMenuItem
DestroyMenu
CreatePopupMenu
GetMenuStringA
LoadCursorW
SetCursor
InvalidateRect
GetSysColor
DrawTextW
GetWindowThreadProcessId
GetKeyState
EnumWindows
FindWindowA
GetWindowLongW
GetWindowTextA
AppendMenuA
MessageBoxW
MessageBoxA
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
PeekMessageW
UnregisterClassW
ReleaseDC
GetDC
SetWindowPos
LoadIconW
GetWindowRect
GetClientRect
DrawIcon
AppendMenuW
GetSystemMenu
GetSystemMetrics
EnableWindow
IsIconic
SetWindowTextA
SetWindowTextW
GetDlgItem
PostMessageW
SendMessageW
IsChild
gdi32
TextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetMapMode
RectVisible
PtVisible
GetTextExtentPoint32W
GetStockObject
GetClipBox
CreateBitmap
EndDoc
StartDocA
Escape
CreateDCA
SetDIBits
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
DeleteDC
CreatePalette
CreateDIBitmap
CreateCompatibleDC
BitBlt
ExtTextOutW
GetTextMetricsW
SetTextColor
SetBkColor
GetTextColor
GetBkColor
DeleteObject
CreateFontIndirectW
SelectObject
SaveDC
RestoreDC
GetObjectW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegOpenKeyExA
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
shlwapi
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
ole32
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
CoCreateGuid
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
VariantChangeType
oleacc
CreateStdAccessibleObject
LresultFromObject
Exports
Exports
Sections
.text Size: - Virtual size: 704KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp Size: - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 670KB - Virtual size: 670KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE