Behavioral task
behavioral1
Sample
799968928b6922582cb5bd70fea2c95dccf579e5863c808fc231fdc5322a78cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
799968928b6922582cb5bd70fea2c95dccf579e5863c808fc231fdc5322a78cd.exe
Resource
win10v2004-20240802-en
General
-
Target
b0963749147568a7e43f7d6352480eed.zip
-
Size
6.4MB
-
MD5
d799eea2f79d60aea25871ab2ee57d10
-
SHA1
1870503ce12bd8719949eea092e1b37f1043cff4
-
SHA256
baab1e1ed0013dd22230197d85edb3cb8866e35f04552f79fbbe12a98cf82e2b
-
SHA512
a93c042507444f57a14b1f1ef2dd32053e39e9561fdf41ec7dc6aa3f481360b4eeebee1f59bd795d2e28083fd06f8e7df21a0ccf6d18cfb2d5a18d507f28b13f
-
SSDEEP
98304:cBHi5aQSjTmReQkpu8Pndf7zLDzAbXH1WWXFeF426D+1/O88fWL:x0QSj6RetpbVHLDzeXdwhIzfw
Malware Config
Signatures
-
resource yara_rule static1/unpack001/799968928b6922582cb5bd70fea2c95dccf579e5863c808fc231fdc5322a78cd vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/799968928b6922582cb5bd70fea2c95dccf579e5863c808fc231fdc5322a78cd
Files
-
b0963749147568a7e43f7d6352480eed.zip.zip
Password: infected
-
799968928b6922582cb5bd70fea2c95dccf579e5863c808fc231fdc5322a78cd.exe windows:6 windows x64 arch:x64
Password: infected
79091f44d1c607440f9501422ad5eead
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
WSASetLastError
wldap32
ord50
crypt32
CryptQueryObject
advapi32
CryptEnumProvidersW
kernel32
GetFileInformationByHandle
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetProcessWindowStation
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
shell32
ShellExecuteA
userenv
UnloadUserProfile
rpcrt4
UuidToStringA
urlmon
URLDownloadToFileW
bcrypt
BCryptGenRandom
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 788KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ