General
-
Target
60d46163ef969dc8d0107be0b44a640b9fd4f725b931ecebd0a85bddaf99cef5
-
Size
99KB
-
MD5
965a834e9ccdb76484da24e858432d52
-
SHA1
8ff179a4a0b0a60f1d029b08c5faa6340efdf306
-
SHA256
60d46163ef969dc8d0107be0b44a640b9fd4f725b931ecebd0a85bddaf99cef5
-
SHA512
b02ad4b02c9159324959afeb6c910df1f6eb5533d69d6d0ad62950e43a74fd29913dae55701e68e6bf8ce1333d091b5fa96ec9c86afc896b1f5513ff31387c0b
-
SSDEEP
1536:X1wE/kKipNuZ6fAzbiagFWx8YiKQGX374tU0cRAC5ub2oJPt4U/mw53w/Go:xkKgNuZzxr/51b4U0cR7YbVuUE/Go
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 60d46163ef969dc8d0107be0b44a640b9fd4f725b931ecebd0a85bddaf99cef5
Files
-
60d46163ef969dc8d0107be0b44a640b9fd4f725b931ecebd0a85bddaf99cef5.sys windows:6 windows x86 arch:x86
24ef0d60c26640377faca682101c3916
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netio.sys
WskCaptureProviderNPI
WskReleaseProviderNPI
WskDeregister
WskRegister
ntoskrnl.exe
wcscat_s
wcscpy_s
KeGetCurrentThread
RtlInitUnicodeString
KeInitializeEvent
KeSetEvent
KeSetPriorityThread
KeWaitForMultipleObjects
KeWaitForSingleObject
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
ExfInterlockedInsertTailList
ExfInterlockedRemoveHeadList
MmMapLockedPagesSpecifyCache
PsCreateSystemThread
PsTerminateSystemThread
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ZwClose
SeTokenType
SeCreateClientSecurity
SeImpersonateClient
PsDereferencePrimaryToken
PsDereferenceImpersonationToken
PsRevertToSelf
PsThreadType
RtlAnsiCharToUnicodeChar
RtlUnicodeToMultiByteN
MmProbeAndLockPages
MmGetSystemRoutineAddress
PsGetVersion
IoAllocateMdl
IoCreateSynchronizationEvent
IoFreeMdl
MmIsAddressValid
MmUnlockPages
IoAllocateIrp
IoCancelIrp
IoFreeIrp
_allmul
RtlUnicodeStringToInteger
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
KeDelayExecutionThread
KeQuerySystemTime
ExSystemTimeToLocalTime
ZwOpenKey
ZwQueryValueKey
KeTickCount
ZwWriteFile
MmBuildMdlForNonPagedPool
MmProtectMdlSystemAddress
MmUnmapLockedPages
ZwSetSecurityObject
ObOpenObjectByPointer
IoDeviceObjectType
RtlUnwind
RtlGetDaclSecurityDescriptor
RtlGetSaclSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlGetOwnerSecurityDescriptor
_snwprintf
RtlLengthSecurityDescriptor
SeCaptureSecurityDescriptor
SeExports
IoIsWdmVersionAvailable
_wcsnicmp
RtlAddAccessAllowedAce
RtlLengthSid
wcschr
RtlAbsoluteToSelfRelativeSD
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
ZwCreateKey
ZwSetValueKey
KeBugCheckEx
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
HalMakeBeep
Sections
.text Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ