Behavioral task
behavioral1
Sample
538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638.exe
Resource
win10v2004-20240508-en
General
-
Target
538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638
-
Size
14.4MB
-
MD5
bcbb20d49647e576a8a3e044d21cc3ee
-
SHA1
e930c2d861ea65653e59a6665a397879d0ba3484
-
SHA256
538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638
-
SHA512
638d2e729a96d9eae5f90bc9f8fa04b79c025628feda8a60f4c77a60ef897f6351a264b68d6e009399fa80d2e75f26aea8b1256fb6554349983927b1ce3158fe
-
SSDEEP
393216:5Qdf4kgdTOtmasx4L6EHcXH7rhSrPdTH4ha:5UzSHasKFcXBSj6ha
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638
Files
-
538c191b66131ca52848aa7111828f0059154174046d833f9fd926f036191638.exe windows:5 windows x86 arch:x86
bf84f2351361fed6e44981897422ef2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
winmm
midiStreamOut
ws2_32
socket
rasapi32
RasGetConnectStatusA
kernel32
GetVersion
GetVersionExA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetScrollRange
CharUpperBuffW
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
VariantChangeType
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
ChooseColorA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 8.4MB - Virtual size: 8.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ