C:\vmagent_new\bin\joblist\720987\out\Release\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93.exe
Resource
win10v2004-20240226-en
General
-
Target
fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93
-
Size
4.8MB
-
MD5
69defbc6e73a66e0db32673c907b292a
-
SHA1
fe7e6b214fb63387af8a057ab060e2eb00e220e7
-
SHA256
fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93
-
SHA512
35d8e27f68f12264d04b9e08facf0137efc789389fed746673cc49b17509ca1ba87bf875b14796cec2df43eac82d1255702669dbaf150795bbe7f818b97d391e
-
SSDEEP
98304:EPkWri10P6uwAmmdwVBjbYEMcWzan+LC0eHwd4QmLM8QB6:EzUuwANdwVBjbY9cULC0eHwyQmqo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93
Files
-
fcc77a230b510ffee0a351c2b30d0d7dfe2382c396e4cca2944168cf79ee2a93.exe windows:5 windows x86 arch:x86
e85dd3214611ff80022e8e2097c2d409
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetTempPathW
GetLocalTime
GetCurrentProcessId
DeviceIoControl
FindClose
FindNextFileW
CopyFileW
FindFirstFileW
GetLogicalDriveStringsW
GetWindowsDirectoryW
GetSystemDirectoryW
GetFileAttributesW
GetExitCodeProcess
RemoveDirectoryW
DeleteFileW
GetTempFileNameW
lstrcatW
InterlockedExchange
MoveFileExW
MoveFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetThreadPriority
ResumeThread
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
CreateMutexW
ReadFile
GetFileSize
TlsFree
ReleaseMutex
CreateMutexA
GetModuleHandleA
ProcessIdToSessionId
Thread32Next
SuspendThread
OpenThread
Thread32First
GlobalMemoryStatus
SystemTimeToFileTime
FileTimeToSystemTime
SetEnvironmentVariableW
WritePrivateProfileSectionW
QueryDosDeviceW
ReadProcessMemory
Module32NextW
Module32FirstW
GetPrivateProfileIntW
InterlockedCompareExchange
GetFileAttributesExW
TlsSetValue
TlsGetValue
GetCommandLineW
GetLongPathNameW
lstrcmpW
GetACP
TerminateProcess
GetPrivateProfileSectionW
GetTimeZoneInformation
GetCurrentProcess
GetFileTime
SetFilePointer
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetLocaleInfoW
SetConsoleCtrlHandler
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
HeapCreate
FatalAppExitA
GetCurrentThread
TlsAlloc
GetModuleFileNameA
GetStdHandle
GetStartupInfoW
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetStdHandle
MultiByteToWideChar
FreeLibrary
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
FlushInstructionCache
SetEnvironmentVariableA
FreeResource
LocalFileTimeToFileTime
SetFilePointerEx
SetLastError
InterlockedDecrement
InterlockedIncrement
GetLastError
CreateFileMappingW
GetFileSizeEx
OutputDebugStringW
HeapUnlock
HeapLock
HeapWalk
MapViewOfFile
lstrlenW
lstrcpyW
AreFileApisANSI
WideCharToMultiByte
Sleep
FindResourceExW
FindResourceW
LoadResource
LockResource
UnmapViewOfFile
SetFileTime
LoadLibraryExW
GetCurrentThreadId
lstrcmpiW
CreateThread
WaitForSingleObject
TerminateThread
ExpandEnvironmentStringsW
CreateFileW
WriteFile
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceExW
GetVersionExW
GetVersion
GetModuleHandleW
GetProcAddress
GetLocaleInfoA
SizeofResource
RaiseException
GetTickCount
CreateDirectoryW
SetFileAttributesW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
FileTimeToLocalFileTime
GetStringTypeW
user32
RegisterClassExW
MoveWindow
GetWindowRgn
EnumThreadWindows
WindowFromPoint
GetSystemMetrics
SwitchToThisWindow
SetForegroundWindow
BringWindowToTop
UnregisterClassA
SendMessageTimeoutW
FindWindowW
ClientToScreen
GetSysColor
SetCursor
FillRect
CallWindowProcW
GetDlgCtrlID
SetCapture
IsWindowEnabled
UpdateWindow
ReleaseCapture
PtInRect
CreateDialogParamW
WaitForInputIdle
CharLowerBuffW
LoadCursorW
SetRectEmpty
DestroyCursor
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadImageW
GetClassNameW
CreateCursor
PostQuitMessage
OffsetRect
CharNextW
GetCursorPos
LoadStringW
DrawTextW
GetWindow
SystemParametersInfoW
MapWindowPoints
IsWindow
AdjustWindowRectEx
IsDialogMessageW
MessageBoxW
GetDlgItem
GetParent
ChildWindowFromPoint
SetDlgItemTextW
GetDlgItemTextW
SetFocus
EnableWindow
KillTimer
SetTimer
ShowWindow
InvalidateRect
ReleaseDC
GetWindowDC
GetDC
EndPaint
BeginPaint
ScreenToClient
GetWindowRect
GetMenu
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
PostMessageW
GetWindowLongW
CreateWindowExW
SetWindowLongW
DestroyWindow
SendMessageW
ExitWindowsEx
SetWindowPos
GetClientRect
GetCapture
gdi32
GetPixel
DeleteDC
Rectangle
SetTextColor
SetBkMode
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
StretchBlt
CreatePen
CreateBrushIndirect
PtInRegion
CreateRectRgn
CreateDIBSection
BitBlt
SetStretchBltMode
advapi32
EqualSid
OpenProcessToken
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
IsValidSid
FreeSid
AllocateAndInitializeSid
GetTokenInformation
GetUserNameW
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHFileOperationW
ord165
SHGetFolderPathW
SHCreateDirectoryExW
SHChangeNotify
ShellExecuteExW
CommandLineToArgvW
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemRealloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
shlwapi
PathAppendW
StrCmpNIW
SHDeleteKeyW
SHDeleteValueW
StrCmpNW
PathRemoveFileSpecW
SHSetValueW
PathFindFileNameW
StrStrIW
PathCombineW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
PathRemoveBackslashW
SHGetValueW
comctl32
_TrackMouseEvent
ImageList_Destroy
InitCommonControlsEx
ImageList_GetIconSize
ws2_32
closesocket
htons
socket
gethostbyname
connect
WSAStartup
setupapi
SetupIterateCabinetW
psapi
GetModuleFileNameExW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
crypt32
CertGetNameStringW
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
msimg32
AlphaBlend
Sections
.text Size: 642KB - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 143.5MB - Virtual size: 143.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ