C:\vmagent_new\bin\joblist\678015\out\Release\DumpUper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6dcdd1ae63d1647665b3b01a7bad3852316155d1495f7e28c17dd18389e13d9e.exe
Resource
win7-20240221-en
General
-
Target
6dcdd1ae63d1647665b3b01a7bad3852316155d1495f7e28c17dd18389e13d9e
-
Size
1.8MB
-
MD5
ebec85a1f09b4741f36af4a75ecad182
-
SHA1
d15305391f00ceadd44cca685a94a168e5660a66
-
SHA256
6dcdd1ae63d1647665b3b01a7bad3852316155d1495f7e28c17dd18389e13d9e
-
SHA512
67a098aa0fb8cd4ba52a90ee4be99949d07dbba25a46b95d626e810839be69c0e89ef1e8b8761e632729647199690bb81ce288c7b0ab30f5a482ec0ac79bf27d
-
SSDEEP
24576:U8koPktwFmebfNDxoWKQCYTfd+6alTnENaKe9:ooM3mLCYT8hlTENaK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6dcdd1ae63d1647665b3b01a7bad3852316155d1495f7e28c17dd18389e13d9e
Files
-
6dcdd1ae63d1647665b3b01a7bad3852316155d1495f7e28c17dd18389e13d9e.exe windows:5 windows x86 arch:x86
f0578a9ac83fe8b5c45a85d5a73232fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
LockResource
LoadResource
FindResourceW
FindResourceExW
ReadFile
GetFileSize
FlushInstructionCache
GetCurrentThreadId
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
LoadLibraryExW
CreateDirectoryW
GetWindowsDirectoryW
DeleteFileW
WritePrivateProfileStringW
GetTickCount
GetPrivateProfileSectionW
LocalFree
GetCommandLineW
WaitForSingleObject
CreateThread
GetEnvironmentVariableW
WritePrivateProfileSectionW
CreateProcessW
CreateFileA
Sleep
InterlockedCompareExchange
WriteFile
SetFilePointer
GetNativeSystemInfo
DeleteFileA
GetPrivateProfileStringW
GetFileAttributesExA
GetPrivateProfileStringA
GetPrivateProfileIntA
WideCharToMultiByte
GetACP
GetModuleFileNameA
GetTempPathW
GetExitCodeProcess
GetVersionExW
lstrcpynW
MulDiv
DeviceIoControl
GetCurrentProcessId
GetPrivateProfileSectionNamesW
GetCurrentThread
VirtualQuery
VirtualAlloc
GetSystemInfo
VirtualFree
ResumeThread
GetThreadContext
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
VirtualProtectEx
SizeofResource
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoW
GetStdHandle
GetFileType
WriteConsoleW
SetEndOfFile
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetSystemTimeAsFileTime
InterlockedExchange
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
GetCurrentProcess
HeapAlloc
MultiByteToWideChar
LoadLibraryW
GetProcAddress
GetTempPathA
GetModuleFileNameW
GetSystemDirectoryW
GetProcessHeap
HeapFree
RaiseException
GetSystemWindowsDirectoryA
CreateFileW
GetConsoleCP
GetConsoleMode
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetStartupInfoA
SetStdHandle
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
OutputDebugStringW
CreateMutexW
GetModuleHandleA
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetLocaleInfoA
GetStringTypeA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
CompareStringA
CompareStringW
GetFileSizeEx
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
SetEnvironmentVariableA
GetTimeZoneInformation
user32
IsDlgButtonChecked
SetWindowLongW
CharNextW
wsprintfW
UnregisterClassA
ReleaseDC
FindWindowW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
GetDC
GetDlgItemTextW
CheckDlgButton
EnableWindow
KillTimer
SetTimer
ShowWindow
SetWindowTextW
GetWindowLongW
SendMessageW
EndDialog
DefWindowProcW
GetActiveWindow
DialogBoxParamW
DestroyWindow
gdi32
CreateSolidBrush
GetDeviceCaps
DPtoLP
CreateFontIndirectW
SetBkMode
GetStockObject
DeleteObject
CreateFontW
advapi32
RegCreateKeyExW
GetUserNameW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
shell32
CommandLineToArgvW
ExtractIconW
ShellExecuteExW
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathRemoveBackslashA
PathFindFileNameA
StrStrIW
PathFileExistsW
SHGetValueW
PathAppendW
SHSetValueW
PathFindFileNameW
PathFileExistsA
SHGetValueA
StrCmpNIW
PathCombineW
comctl32
InitCommonControlsEx
wininet
DeleteUrlCacheEntryW
InternetCloseHandle
InternetReadFile
InternetWriteFile
InternetAttemptConnect
InternetConnectA
InternetOpenA
HttpSendRequestExA
HttpEndRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
HttpSendRequestA
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
wintrust
CryptCATAdminReleaseCatalogContext
WinVerifyTrust
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminReleaseContext
CryptCATAdminAcquireContext
Sections
.text Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 163KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE