main
Behavioral task
behavioral1
Sample
ab32e389f4b93a0dec5f463b6f6e71b0e32c76955fe781bd9331617fd8241182.dll
Resource
win7-20240708-en
General
-
Target
ab32e389f4b93a0dec5f463b6f6e71b0e32c76955fe781bd9331617fd8241182
-
Size
464KB
-
MD5
9195e367c752a833e0522863bd7206b8
-
SHA1
f4dc3a9637c94a1e9ed83fbdb34fe5d02986a011
-
SHA256
ab32e389f4b93a0dec5f463b6f6e71b0e32c76955fe781bd9331617fd8241182
-
SHA512
8954376fe204754a93427b6ad5f67174b89eaba950f9c0288a75ee6ac8b4c05c21a2a065fffe5a4382f64a3047f88bb6650a60159ccbfb2a553a9cdce870efd6
-
SSDEEP
12288:P9Ctm7WMaYDjuvwCcYPvIXHPKL1JyUScnoBR2:P917WMEzcY3IXiZJy2oB0
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab32e389f4b93a0dec5f463b6f6e71b0e32c76955fe781bd9331617fd8241182
Files
-
ab32e389f4b93a0dec5f463b6f6e71b0e32c76955fe781bd9331617fd8241182.dll windows:4 windows x86 arch:x86
78be2c958e36a9bda8dce47f0304e314
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetVersionExA
GetLocalTime
GetCommandLineA
VirtualAlloc
FreeLibrary
LCMapStringA
WriteProcessMemory
VirtualQueryEx
GetCurrentProcessId
VirtualProtect
ReadProcessMemory
VirtualQuery
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
GetModuleFileNameA
GetCurrentProcess
SetLastError
FlushInstructionCache
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
wsprintfA
MessageBoxA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
RegOpenKeyA
LookupPrivilegeValueA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
shlwapi
StrToIntExA
Exports
Exports
Sections
.text Size: - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 452KB - Virtual size: 450KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ