C:\vmagent_new\bin\joblist\694637\out\Release\360Newsld.pdb
Static task
static1
Behavioral task
behavioral1
Sample
155b576fcf14df39bc2850f3564fe1499709d65186697f850ef9882fba59c40e.exe
Resource
win7-20240215-en
General
-
Target
155b576fcf14df39bc2850f3564fe1499709d65186697f850ef9882fba59c40e
-
Size
1.2MB
-
MD5
fe04c65338f0c2244fb07a4cbf661b68
-
SHA1
e449628bef61af73e14a6626179ca3ff57420743
-
SHA256
155b576fcf14df39bc2850f3564fe1499709d65186697f850ef9882fba59c40e
-
SHA512
bd15497909d516f3b9214e277e2fc8015cbc7c6742268c27c61f8736eab7515d8a8bc93dc9f8051b873369100779a0c6689b0f08fab2641fa229e54b048c3e97
-
SSDEEP
24576:mbPoh9lbgK2ppSy1Uj/+SPMk6Ac/gv+xyztp9YaUmmM+99s:m7aqK2pEwe+S0dAwgv+Ep9YaUmx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 155b576fcf14df39bc2850f3564fe1499709d65186697f850ef9882fba59c40e
Files
-
155b576fcf14df39bc2850f3564fe1499709d65186697f850ef9882fba59c40e.exe windows:5 windows x86 arch:x86
dd5338a83e1666f5c8d53eb1189d0d0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetUserDefaultLangID
GetFileSizeEx
FlushInstructionCache
GetShortPathNameW
GetLocalTime
GetCommandLineW
RemoveDirectoryW
GetModuleHandleExW
ResetEvent
WaitForMultipleObjects
GetStartupInfoW
lstrcpynW
GetCurrentThread
SetCurrentDirectoryW
FindFirstFileW
FindNextFileW
FindClose
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileAttributesW
WriteFile
DeviceIoControl
LocalAlloc
SuspendThread
SetThreadContext
GetThreadContext
ResumeThread
VirtualQuery
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
FlushFileBuffers
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameA
HeapCreate
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SetFilePointer
CreateDirectoryW
DeleteFileW
SetFileAttributesW
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetTickCount
CreateProcessW
GetSystemInfo
ReadFile
InterlockedExchange
GlobalUnlock
GlobalLock
SetEvent
CreateEventW
lstrlenA
WaitForSingleObject
SetLastError
CloseHandle
CreateFileW
GetCurrentProcessId
WideCharToMultiByte
GetVersion
GetEnvironmentVariableW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
SetErrorMode
VirtualProtect
GetModuleHandleA
SetUnhandledExceptionFilter
CreateMutexW
TerminateProcess
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
MultiByteToWideChar
GetLastError
lstrcmpiW
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcess
FreeLibrary
Sleep
SizeofResource
InterlockedCompareExchange
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetVersionExW
lstrlenW
RaiseException
FreeResource
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsW
GetModuleFileNameW
GetProcAddress
GetWindowsDirectoryW
MulDiv
FindResourceExW
FindResourceW
LoadResource
LockResource
GetUserDefaultLCID
user32
GetDoubleClickTime
AttachThreadInput
ReleaseDC
UnregisterClassA
GetDC
LoadImageW
GetSystemMetrics
DefWindowProcW
CharNextW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DestroyWindow
FindWindowW
LoadCursorW
ClientToScreen
SetWindowTextW
UpdateLayeredWindow
SetCursor
DrawIconEx
GetActiveWindow
MessageBoxW
FindWindowExW
CreateWindowExW
CopyRect
IsIconic
GetForegroundWindow
GetClassInfoExW
RegisterClassExW
MonitorFromWindow
GetMonitorInfoW
RegisterWindowMessageW
IsWindowVisible
GetWindowThreadProcessId
SystemParametersInfoW
IsWindow
CallWindowProcW
GetDlgItem
BringWindowToTop
PostQuitMessage
SendMessageTimeoutW
SetActiveWindow
SetForegroundWindow
ShowWindow
SetTimer
ScreenToClient
BeginPaint
EndPaint
GetCursorPos
WindowFromPoint
KillTimer
GetWindowLongW
GetWindowRect
MapWindowPoints
SetWindowPos
SetWindowLongW
GetCapture
SetCapture
ReleaseCapture
PostMessageW
InvalidateRect
OffsetRect
GetParent
SendMessageW
UpdateWindow
GetClientRect
GetClassLongW
FillRect
IntersectRect
DrawTextW
PtInRect
SetRectEmpty
gdi32
BitBlt
CreateDCW
GetDIBits
SetStretchBltMode
StretchBlt
SelectObject
DeleteDC
CreateCompatibleBitmap
DeleteObject
GetObjectW
GetStockObject
EnumFontFamiliesExW
CreateFontIndirectW
DPtoLP
DeleteEnhMetaFile
PlayEnhMetaFile
GetEnhMetaFileHeader
SetEnhMetaFileBits
GetDeviceCaps
SetTextColor
GetTextColor
SetBkMode
GetTextExtentPoint32W
GetClipBox
ExcludeClipRect
SetViewportOrgEx
OffsetViewportOrgEx
IntersectClipRect
SaveDC
RestoreDC
SetBkColor
ExtTextOutW
CreateDIBSection
CreateCompatibleDC
TextOutW
advapi32
RegQueryValueExA
RegCloseKey
SaferCloseLevel
CreateProcessAsUserW
SaferComputeTokenFromLevel
SaferCreateLevel
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteExW
SHGetFileInfoW
SHChangeNotify
SHFileOperationW
ShellExecuteW
SHAppBarMessage
SHCreateDirectoryExW
ole32
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantCopy
SafeArrayCopy
SafeArrayGetVartype
DispCallFunc
SafeArrayCreate
VariantInit
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
StrStrW
StrStrIW
PathCombineW
SHDeleteValueW
PathIsRelativeW
PathCanonicalizeW
StrCmpIW
PathIsDirectoryW
PathIsRootW
PathFindFileNameW
PathAddBackslashW
PathRemoveArgsW
PathUnquoteSpacesW
SHQueryValueExW
StrStrIA
SHSetValueW
SHGetValueW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
imm32
ImmDisableIME
rpcrt4
NdrClientCall2
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
RpcBindingFree
Sections
.text Size: 691KB - Virtual size: 690KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 151KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE