Behavioral task
behavioral1
Sample
hm whats this.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
hm whats this.exe
Resource
win10v2004-20240802-en
General
-
Target
hm whats this.exe
-
Size
10.6MB
-
MD5
61e741f601d884295da0bd9f7093c7f5
-
SHA1
d252d7bec0eba42c4c00bbb92939462c84bb902f
-
SHA256
e9048c9e80d7fda30d801661e29495f0a146819908ab136923c80260ad66f72a
-
SHA512
6a281f23a9a979674d64f3ab617fcaec1018c825b79ab9e64b30397f4865a8917e7a94eb291c7ddad35fed88a299954eb44fdf2f8b3da56ba50dcf8e65ea4dad
-
SSDEEP
196608:eSUMWRAtRpPwvZjq85wdqsI/6kRH+F/lrA/r3ibA040g7TBoTwBBHlCIjPzU:eSrc0RpUNqYwi6kIh5QR5HB/lCIjPA
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hm whats this.exe
Files
-
hm whats this.exe.exe windows:6 windows x64 arch:x64
1f9ced065df682408cdbc8874dbb7cb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
EnterCriticalSection
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ScreenToClient
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
CreateSolidBrush
advapi32
CryptGenRandom
shell32
SHGetFolderPathW
msvcp140
_Query_perf_counter
ntdll
RtlInitAnsiString
dbghelp
ImageRvaToVa
d3d11
D3D11CreateDeviceAndSwapChain
imm32
ImmReleaseContext
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
d3dcompiler_43
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
rpcrt4
UuidToStringA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
api-ms-win-crt-stdio-l1-1-0
fwrite
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-math-l1-1-0
powf
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-time-l1-1-0
_localtime64
ws2_32
gethostname
normaliz
IdnToAscii
crypt32
CertOpenStore
wldap32
ord45
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 988KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 647KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 7.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 10.6MB - Virtual size: 10.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ