Behavioral task
behavioral1
Sample
43e121dd9002f72fb4f703ccb7cd1f20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43e121dd9002f72fb4f703ccb7cd1f20N.exe
Resource
win10v2004-20240704-en
General
-
Target
43e121dd9002f72fb4f703ccb7cd1f20N.exe
-
Size
7.9MB
-
MD5
43e121dd9002f72fb4f703ccb7cd1f20
-
SHA1
dee87734731f39084337269517b8abca22a6b5ab
-
SHA256
0905a2c198d7c085859d08f5692e10e529423584fd931de5dc5502276fdcb066
-
SHA512
8a667bbd86ef44ce59d07fc1b93ead2062b8c237f95b98007243727d3ebe7d074f2ca8cbd6dcccc9b7bc2a44f22ba5ce047b2e12bbcdb75a41e4965db597dc49
-
SSDEEP
196608:sCjwCY2yu23mp+qvt6qmpakzNxnj4BraAKMTBp:sKzm3mp+yt6qm3z0aAp
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43e121dd9002f72fb4f703ccb7cd1f20N.exe
Files
-
43e121dd9002f72fb4f703ccb7cd1f20N.exe.exe windows:6 windows x86 arch:x86
19cc4d9d72c21d09c7e1c733b5eee8a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
LookupPrivilegeValueA
kernel32
SwitchToThread
GetVersionExA
ntdll
NtReadFile
ws2_32
setsockopt
user32
GetSystemMetrics
bcrypt
BCryptGenRandom
psapi
GetModuleFileNameExA
Sections
.text Size: - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 7.9MB - Virtual size: 7.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ