Z:\Ventoy\Ventoy2Disk\Release\Ventoy2Disk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70.exe
Resource
win10v2004-20240226-en
General
-
Target
48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70
-
Size
458KB
-
MD5
2efa802569c955eb8a26eb5be7015012
-
SHA1
2d5e3cfe7cde013e5d249d9f20db05b501806085
-
SHA256
48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70
-
SHA512
86130cabe4253c70739ce16f69023cbc3d7e386e22a63afda312c1251a0f8683888704705938fca7e4ced986497ea7cf5ba78168454226ba940ba9ab24b113b0
-
SSDEEP
12288:3eBJWcIKXeeIKVnvzxnVWqqPIBONhxs8gbRiBjvrEH7eX:3eBu/m7U/xs8KKrEH7eX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70
Files
-
48e3cba24fd4e1f94189a3039e8c57f12194588a2f518080bc96aa2413683a70.exe windows:6 windows x86 arch:x86
1dbd68264e6e640ded4a988fbe24b028
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GetCurrentProcessId
CreateProcessA
SetLastError
Sleep
FormatMessageW
GetLastError
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
ReadFile
WriteFile
SetFilePointerEx
GetLogicalDrives
DeleteVolumeMountPointA
DeviceIoControl
SetFilePointer
QueryDosDeviceA
FindFirstVolumeA
GetTickCount64
SetVolumeMountPointA
CreateFileA
GetLogicalDriveStringsA
FindNextVolumeA
FindVolumeClose
GetCurrentProcess
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
GetModuleHandleA
LoadLibraryA
GetNativeSystemInfo
GetProcAddress
ReadProcessMemory
QueryFullProcessImageNameW
GetFileType
IsWow64Process
VerifyVersionInfoA
GetProductInfo
GetFileAttributesA
GetVersionExA
GetLocalTime
GetSystemWow64DirectoryA
GetPrivateProfileIntA
lstrlenW
GetSystemDefaultUILanguage
GetPrivateProfileIntW
GetStartupInfoA
CreateFileW
GetVolumeNameForVolumeMountPointA
GetPrivateProfileSectionNamesW
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
GetPrivateProfileStringW
GetDiskFreeSpaceA
Process32NextW
Process32FirstW
CreateThread
GetWindowsDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileSize
lstrcpyW
lstrcmpW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
LCMapStringW
FreeEnvironmentStringsW
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
HeapSize
CloseHandle
DeleteFileA
GetCurrentDirectoryA
HeapReAlloc
WaitForSingleObject
WriteConsoleW
SetEndOfFile
GetVolumeInformationA
DecodePointer
GetStdHandle
GetCommandLineW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetCommandLineA
user32
ModifyMenuW
LoadMenuW
GetMenu
DeleteMenu
GetSubMenu
ShowWindow
SetWindowTextA
SendDlgItemMessageW
SetMenu
SetFocus
LoadIconW
GetMenuState
CheckMenuItem
AppendMenuW
DialogBoxParamW
UpdateWindow
InvalidateRect
GetSystemMetrics
MessageBoxW
SendMessageW
EndDialog
SetWindowTextW
GetWindowTextA
GetDlgItem
EnableWindow
wsprintfW
SendMessageA
gdi32
GetStockObject
SetTextColor
SetBkMode
CreateFontW
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteW
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateGuid
CoCreateInstance
CoTaskMemFree
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ