C:\vmagent_new\bin\joblist\661480\out\Release\360FileChecker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8ff5ccd100658eacb80696ad4110c34b3cdeaee3e82d7815251702c790a877b.exe
Resource
win7-20240221-en
General
-
Target
b8ff5ccd100658eacb80696ad4110c34b3cdeaee3e82d7815251702c790a877b
-
Size
513KB
-
MD5
95c937e4c5ced7d295793862c633ffae
-
SHA1
39823404419bd2c3a55f5c7b4a4f29f2636401cd
-
SHA256
b8ff5ccd100658eacb80696ad4110c34b3cdeaee3e82d7815251702c790a877b
-
SHA512
9e3e3f99d3f9fc3dca246e2cad6a4be46c1f668aabadf1ff7fe226a34ca40213a19859b00762f40933c048944bc16bf6cc1c339aa6ab76ad5bf28789a18d48d4
-
SSDEEP
6144:CvGdSWgpAQ9cM2/cNyTU/WxcGDLfe1dmOvJ2pd2rLpk4oP9CDKcD4DHy9lm:ldSWgmq1/yTU/W+EUFvJ5ri4bKpHy9lm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8ff5ccd100658eacb80696ad4110c34b3cdeaee3e82d7815251702c790a877b
Files
-
b8ff5ccd100658eacb80696ad4110c34b3cdeaee3e82d7815251702c790a877b.exe windows:5 windows x86 arch:x86
c655d4c10703bd102eada058fbab550c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
GetFileSizeEx
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileAttributesA
GetTempPathW
GetVersion
GetCommandLineW
SetFilePointer
GlobalLock
SetEvent
GetTickCount
WriteFile
GlobalAlloc
ReadFile
GlobalUnlock
CreateEventW
GetCurrentProcessId
GetTempFileNameW
FindClose
DeleteFileW
WaitForSingleObject
WaitForMultipleObjects
InterlockedExchange
DeviceIoControl
WideCharToMultiByte
GetModuleHandleExW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleHandleA
QueryPerformanceCounter
CloseHandle
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeA
GetStartupInfoA
GetFileType
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
GetStringTypeW
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
CreateThread
ExitThread
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
GetCurrentThreadId
DeleteCriticalSection
lstrcmpiW
LockResource
EnterCriticalSection
GetProcAddress
SetLastError
GetLastError
RaiseException
ExitProcess
FlushInstructionCache
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
MulDiv
LeaveCriticalSection
GetVersionExW
SizeofResource
Sleep
LoadLibraryW
GetSystemDirectoryW
InitializeCriticalSection
GetModuleHandleW
InterlockedCompareExchange
GetSystemWindowsDirectoryW
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
LoadResource
FreeLibrary
SystemTimeToFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetLocaleInfoA
FindResourceW
FindResourceExW
FreeResource
CreateMutexW
GetEnvironmentStringsW
user32
SetWindowLongW
ShowWindow
PeekMessageW
TranslateMessage
GetDC
SendMessageTimeoutW
CreateDialogParamW
GetActiveWindow
MessageBoxW
DefWindowProcW
UnregisterClassA
DispatchMessageW
EndPaint
BeginPaint
GetClassInfoW
RegisterClassW
CallWindowProcW
LoadCursorW
RegisterClassExW
IntersectRect
CreateWindowExW
ReleaseDC
GetWindowTextLengthW
CloseClipboard
SetTimer
GetWindowRect
PostQuitMessage
LoadImageW
DrawTextW
KillTimer
DialogBoxParamW
GetParent
GetClientRect
IsDialogMessageW
InvalidateRect
GetWindowLongW
GetWindowTextW
EmptyClipboard
MonitorFromWindow
GetDlgItem
SetWindowPos
IsWindow
OpenClipboard
GetSystemMetrics
MapWindowPoints
EnableWindow
SetClipboardData
SetWindowTextW
GetMonitorInfoW
GetWindow
MoveWindow
PostMessageW
IsIconic
SendMessageW
FindWindowExW
DestroyWindow
GetMessageW
CharNextW
FindWindowW
EndDialog
gdi32
SetBkColor
ExtTextOutW
CreateDIBSection
DeleteObject
GetObjectW
SetStretchBltMode
GetTextExtentPointW
DeleteDC
SelectObject
CreateFontW
GetDeviceCaps
CreateCompatibleDC
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegQueryValueExA
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
CheckTokenMembership
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
shell32
ShellExecuteW
ShellExecuteExW
DragQueryFileW
ole32
OleInitialize
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysStringLen
VariantInit
SysStringByteLen
VarUI4FromStr
SysAllocString
VariantClear
SysAllocStringByteLen
version
VerQueryValueW
shlwapi
PathCombineW
SHGetValueW
PathRemoveFileSpecW
PathCanonicalizeW
PathIsRelativeW
PathAppendW
PathFileExistsW
comctl32
InitCommonControlsEx
ord17
msimg32
AlphaBlend
gdiplus
GdiplusShutdown
GdiplusStartup
Sections
.text Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE