c:\TeamCityBuildAgent\work\8abdb76cec38c59\DDP\LoaderDDP\Release\VbPatch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4.exe
Resource
win10v2004-20240226-en
General
-
Target
e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4
-
Size
219KB
-
MD5
7df6c3f71c681613dcda1e9d2e9950a5
-
SHA1
16791f9a8970ebc81d8bccd11893d877fb9e00c6
-
SHA256
e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4
-
SHA512
41d48a2746a629c172612c82a9168c557e5ff4c9dbb33bb6d43086ed9cac2598d3e936ba5984772f58b7dfab1951093689429dbdc590170e3031a15cef158b68
-
SSDEEP
3072:uLBq/Wbi+AGlz5qPna9gzz+kI3mKjX+mGJHBAMfLiGvWHebir+lpO7Ul4t3o5:+c/Wbt6Hkvj+mGlmCLijrqpO7iG3O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4
Files
-
e00e6fc0206ee1b9dc4e6da3b5062805688ab64f7dd59d241bbd6b8c66e094c4.exe windows:5 windows x86 arch:x86
311d556f4eeca0f4efc2cf306464ea14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsDirectoryA
PathRemoveFileSpecA
PathFileExistsA
PathAppendA
ddb
?ReadProjectPasswordFromIniFile@DDB_CConnection@@SAHABV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@AAV23@1@Z
dpo
??1DPO_CDlgProtectedProjectElementPassword@@UAE@XZ
??0DPO_CDlgProtectedProjectElementPassword@@QAE@PAVCWnd@@@Z
mfc90
ord266
ord265
ord1258
ord1254
ord3519
ord2283
ord1720
ord4646
ord3277
ord3643
ord2069
ord2591
ord1137
ord798
ord1252
ord6613
ord3213
ord305
ord3178
ord1611
ord4727
ord2896
ord6170
ord1041
ord1174
ord1114
ord4431
ord817
ord405
ord3351
ord2209
ord3390
ord5963
ord4392
ord664
ord2360
ord6740
ord782
ord654
ord777
ord3987
ord639
ord5615
ord4617
ord5152
ord5309
ord4993
ord1810
ord1809
ord1678
ord3344
ord6388
ord1496
ord5636
ord4668
ord3506
ord374
ord1098
ord1155
ord820
ord2208
ord2447
ord793
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord818
ord4333
ord4981
ord5663
ord5646
ord6001
ord3110
ord4890
ord3659
ord589
ord4952
ord4029
ord4030
ord524
ord6557
ord744
ord6166
ord367
ord636
ord2899
ord6048
ord1222
ord595
ord6074
ord1357
ord1108
ord3477
ord1358
ord3479
ord2106
ord2539
ord1183
ord3534
ord3346
ord6391
ord1755
ord1752
ord4331
ord1497
ord4650
ord5585
ord2074
ord5497
ord6780
ord4589
ord5647
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord941
ord899
ord404
ord5520
ord1555
ord663
ord4477
ord5870
ord1062
ord1084
ord1085
ord3687
ord945
ord6481
ord6479
ord4395
ord2497
ord6559
ord5167
ord4760
ord2364
ord4481
ord2480
ord4507
ord5997
ord5851
ord2481
ord1607
ord2327
ord1938
ord1937
ord2057
ord5659
ord5608
ord1792
ord1791
ord1728
ord5633
ord2766
ord2978
ord3107
ord4714
ord2961
ord3135
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4667
ord2139
ord796
ord3940
ord2691
ord3856
ord2524
ord579
ord888
ord2698
ord878
ord881
ord406
ord389
ord1042
ord1603
ord6492
ord5866
ord5835
ord310
ord316
ord300
ord601
ord4311
ord910
ord800
ord581
ord1276
msvcr90
fclose
fopen
_access
_findfirst64i32
_time64
sscanf
_findnext64i32
_findclose
strcat
_itoa
calloc
free
_mbsnbcpy
_setmbcp
rand
srand
strtol
_makepath
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
strncmp
_getdrive
strrchr
_strupr
strstr
__CxxFrameHandler3
_stricmp
strncpy
isspace
isdigit
_mktime64
_gmtime64
strtoul
_mbstok
strchr
remove
strlen
strcmp
toupper
strcpy
_ismbcspace
atoi
_ismbcdigit
sprintf
memmove
memcpy
_mbclen
_mbsupr
_mbslwr
_mbsinc
_mbsicoll
_mbscoll
_mbsnbcmp
_mbsicmp
_mbsrev
_mbsstr
_mbsspn
_mbsrchr
_mbspbrk
_mbscspn
_mbschr
_getcwd
_chdir
_mbscmp
_CxxThrowException
memset
_splitpath
kernel32
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
_lclose
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
ResumeThread
GetTempPathA
GetSystemDirectoryA
CreateDirectoryA
GetExitCodeThread
GetProcAddress
WaitForSingleObject
MultiByteToWideChar
lstrlenA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetVolumeInformationA
GetFileInformationByHandle
GlobalReAlloc
GetVersionExA
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
TerminateProcess
WinExec
Sleep
LoadLibraryA
FreeLibrary
GetLocalTime
DeviceIoControl
WriteFile
ReadFile
GetTickCount
GetVersion
GetPrivateProfileIntA
CreateMutexA
GetWindowsDirectoryA
ReleaseMutex
GetCurrentDirectoryA
SystemTimeToFileTime
SetFileTime
CreateFileA
GetFileTime
CloseHandle
FileTimeToSystemTime
SetFileAttributesA
_lwrite
_lcreat
GlobalFree
_llseek
_lread
_lopen
GetLastError
user32
GetDesktopWindow
RegisterClassA
CreateWindowExA
FindWindowA
DestroyWindow
UnregisterClassA
DefWindowProcA
MessageBoxA
TranslateMessage
DispatchMessageA
PeekMessageA
OemToCharA
CharToOemA
GetSystemMetrics
LoadIconA
KillTimer
SetTimer
GetClientRect
IsIconic
GetSystemMenu
PostMessageA
AppendMenuA
DrawIcon
GetSysColor
EnableWindow
RedrawWindow
IsWindowVisible
InvalidateRect
UpdateWindow
GetWindowRect
FillRect
LoadBitmapA
SendMessageA
gdi32
CreateCompatibleDC
CreateBitmap
CreateSolidBrush
BitBlt
GetObjectA
advapi32
GetUserNameA
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetDesktopFolder
SHBrowseForFolderA
oleaut32
SysFreeString
netapi32
Netbios
mpr
WNetGetConnectionA
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ