D:\a\velopack\velopack\src\Rust\target\i686-pc-windows-msvc\release\deps\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33.exe
Resource
win10v2004-20240226-en
General
-
Target
ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33
-
Size
504KB
-
MD5
a069434b66113dbbee7b642499e21228
-
SHA1
6fc1f005eeba6b9b6437388327a77005447b68ba
-
SHA256
ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33
-
SHA512
a4f752d0df51ca0298b8380a2e9ceb754ccf90ce42c9cacd90a21cccfe2903f1ea96e48a09f4a91f67284e10f7f263c38605751fa9011e35c381f1edc4a685cd
-
SSDEEP
12288:+RlUaD01IkjceHZadKXZTU+Pq2ctkuDccN:0hAyk3Hwki+Pq2cz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33
Files
-
ea7fa654bbeb4a5d9af944ae80d4f8d8d8ee7418c1a9ead8d0613a30d951ae33.exe windows:6 windows x86 arch:x86
a47b050594e5d4cb5a9a31e6ae1648c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MoveFileExW
CloseHandle
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SystemTimeToTzSpecificLocalTime
GetCommandLineW
GetProcessId
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapReAlloc
GetTimeZoneInformationForYear
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsSetValue
GetCurrentThread
InitOnceBeginInitialize
TlsAlloc
InitOnceComplete
TlsFree
TryAcquireSRWLockExclusive
GetStdHandle
GetConsoleMode
WaitForSingleObject
SetFilePointerEx
MultiByteToWideChar
WriteConsoleW
SetLastError
GetModuleHandleW
FormatMessageW
GetCurrentDirectoryW
ReleaseMutex
WaitForSingleObjectEx
FindClose
GetCurrentProcess
GetCurrentProcessId
CreateMutexA
RtlCaptureContext
GetEnvironmentVariableW
GetModuleFileNameW
CreateFileW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
CreateDirectoryW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
CreateThread
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
FindNextFileW
CreateNamedPipeW
ReadFileEx
SleepEx
WriteFileEx
GetLastError
GetSystemTimeAsFileTime
AcquireSRWLockShared
ReleaseSRWLockShared
DeleteFileW
SystemTimeToFileTime
HeapFree
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LoadLibraryA
FindFirstFileW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
RaiseException
RtlUnwind
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeLibrary
LoadLibraryExW
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
DecodePointer
user32
AllowSetForegroundWindow
ntdll
NtReadFile
RtlNtStatusToDosError
NtWriteFile
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
Sections
.text Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ