Behavioral task
behavioral1
Sample
448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988.exe
Resource
win10v2004-20240508-en
General
-
Target
448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988
-
Size
6.9MB
-
MD5
3e7e6750112d950cd4d1743e46b5f9e3
-
SHA1
1c40d9e9d501f535e138fa0db523c1b7ebe47807
-
SHA256
448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988
-
SHA512
ef6482f92ea6fc28e6fb58be73b0cf7f2d3879b921f4ffdedd4d3c327c1742eb0e3fedd9d07c8e21c580d40a0c4217101aabf6f69e2cb62e1ba4d391057616c2
-
SSDEEP
196608:Pv2vNDcNvhsLNMRNVNWTYpZMOmUqMeTuaP71/Jf/:GcNZsLNMRHNkfUhKnJf/
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988
Files
-
448ce6641b75e08308320e98fd34a8ab60937680bfe64af13600312b5b885988.exe windows:5 windows x86 arch:x86
9e595913d17651d0b3274868e1939488
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetVersionExA
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
LoadStringA
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
SetMapMode
winmm
midiStreamRestart
winspool.drv
ClosePrinter
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
shell32
Shell_NotifyIconA
ole32
CoTaskMemFree
oleaut32
VariantCopy
comctl32
ImageList_GetImageCount
oledlg
ord8
ws2_32
recv
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.9MB - Virtual size: 6.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ