C:\vmagent_new\bin\joblist\651125\out\Release\Release\LiveUpdate360.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d7a12617233030d0c694a1eb8c527274bef32dd4aad741c181051ec4f47e160.exe
Resource
win7-20240221-en
General
-
Target
8d7a12617233030d0c694a1eb8c527274bef32dd4aad741c181051ec4f47e160
-
Size
727KB
-
MD5
51935644561505e5a968b748067f68b0
-
SHA1
b0ea8f67d7c68f01b3b59a6a0953b6c3277748e0
-
SHA256
8d7a12617233030d0c694a1eb8c527274bef32dd4aad741c181051ec4f47e160
-
SHA512
3fc6e261e348a57c7c954ade736c21aa4197a7edf9b4d1c4c8f92b9eab8e80c2fc250ce3ec5c8d7b9cc263587a632c1fb5804db94aca1f34e757687f96da1623
-
SSDEEP
12288:Yil6AlE63dbar1eRpyJBtJeRoyjBBjWJ3sf1mLfNXKrEVmLoLPGeNW+JOT8bTHYC:5MAlEAd+heRpyztJeRoyjEsf1sfUoTGM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d7a12617233030d0c694a1eb8c527274bef32dd4aad741c181051ec4f47e160
Files
-
8d7a12617233030d0c694a1eb8c527274bef32dd4aad741c181051ec4f47e160.exe windows:5 windows x86 arch:x86
71b49578b14f1271252b52accaa519f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
GetCurrentThreadId
GetModuleFileNameW
InterlockedDecrement
GetLastError
TerminateProcess
CloseHandle
ReleaseMutex
SetLastError
OpenProcess
CreateMutexW
SetCurrentDirectoryW
RemoveDirectoryW
SetErrorMode
DeleteFileA
lstrlenW
GetVersionExW
GetCommandLineW
ReadFile
SetFilePointer
GetFileType
CreateFileW
InitializeCriticalSection
GetTickCount
MultiByteToWideChar
WritePrivateProfileStringW
WriteFile
GetPrivateProfileIntW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetPrivateProfileStringW
GetFileSize
Sleep
GetTempPathW
MoveFileW
WideCharToMultiByte
SystemTimeToFileTime
GetSystemTime
GetFileAttributesExW
CreateThread
lstrlenA
DeviceIoControl
InterlockedIncrement
lstrcmpiW
SetEndOfFile
GetFileSizeEx
WaitForSingleObject
GetLocalTime
CreateDirectoryW
LoadLibraryExW
InterlockedCompareExchange
HeapFree
GetProcessHeap
GetCurrentProcess
FlushInstructionCache
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTimeZoneInformation
SetEnvironmentVariableA
DeleteCriticalSection
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
LCMapStringA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
QueryPerformanceCounter
HeapCreate
GetStartupInfoA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
RtlUnwind
GetStartupInfoW
lstrcmpiA
lstrcmpA
SleepEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
InterlockedExchange
GetModuleHandleW
GetSystemDirectoryW
FindFirstFileW
DeleteFileW
FindNextFileW
FindClose
GetCurrentProcessId
LoadLibraryW
GetVersionExA
ExpandEnvironmentStringsA
FormatMessageA
GetSystemDirectoryA
GetModuleHandleA
SetEvent
TlsFree
TlsAlloc
HeapWalk
HeapLock
OpenThread
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
HeapDestroy
GetProcAddress
CompareStringW
HeapReAlloc
HeapSize
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
FreeLibrary
user32
GetWindowThreadProcessId
PostMessageW
CreateWindowExW
FindWindowW
ShowWindow
UnregisterClassA
GetActiveWindow
MessageBoxW
RegisterClassExW
DestroyWindow
PeekMessageW
SendMessageTimeoutW
SetForegroundWindow
LockSetForegroundWindow
DefWindowProcW
DestroyIcon
CreatePopupMenu
DestroyMenu
AppendMenuW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
GetClassInfoExW
SetWindowLongW
IsHungAppWindow
OffsetRect
InvalidateRect
UpdateWindow
EnableWindow
CopyRect
PtInRect
GetAsyncKeyState
DialogBoxParamW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetClientRect
MapWindowPoints
SetWindowPos
ScreenToClient
CharNextW
GetMonitorInfoW
EndDialog
CallWindowProcW
LoadImageW
GetSystemMenu
DeleteMenu
GetCursorPos
IsWindowVisible
TrackPopupMenu
PostQuitMessage
WindowFromPoint
IsWindow
IsChild
KillTimer
SetTimer
SetWindowTextW
SendMessageW
GetWindowLongW
MonitorFromPoint
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
OpenProcessToken
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
RegQueryValueExW
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ExtractIconExW
Shell_NotifyIconW
SHFileOperationW
ShellExecuteW
ole32
CoCreateInstance
CLSIDFromProgID
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SysStringByteLen
SysAllocStringByteLen
VariantCopy
VarUI4FromStr
DispCallFunc
VariantClear
VariantInit
SysAllocString
SysFreeString
shlwapi
PathAppendW
PathFileExistsW
SHGetValueW
PathRemoveFileSpecW
StrStrIW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
SHGetValueA
PathCombineW
SHSetValueA
comctl32
InitCommonControlsEx
psapi
EnumProcessModules
GetModuleFileNameExW
version
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ws2_32
WSASetLastError
connect
getpeername
freeaddrinfo
ntohs
WSAStartup
bind
htons
select
getsockopt
__WSAFDIsSet
inet_addr
sendto
getsockname
send
recv
closesocket
recvfrom
gethostbyname
socket
ioctlsocket
setsockopt
htonl
WSACleanup
WSAGetLastError
getaddrinfo
Sections
.text Size: 490KB - Virtual size: 489KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 103KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE