C:\vmagent_new\bin\joblist\574019\out\Release\360Util64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe.dll
Resource
win10v2004-20240419-en
General
-
Target
4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe
-
Size
885KB
-
MD5
bd3a3714ee9a071ebeb59ac91d9ebb5a
-
SHA1
55110a221f20a4ceec34c58d0179fa31f8c102e9
-
SHA256
4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe
-
SHA512
7244220f29057339c99a22c20268187ba6f6681251f4ce4f305ad22dc030f6078b4f298ef10ad392dc5d036c41c7b8c28c2bd997ea39ef7ab023cb9b5c946dc8
-
SSDEEP
12288:WfPSAAUHV4fZUv/TrguVTax7hNRu18VAyJFoxMk/wYeDKDMyPDi:MPSAAUHV4fZUvfgmaxpu1FyJ6xMYHMke
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe
Files
-
4cf2b612939359977df51a32d2f63e2cb0c6c601e114b8e4812bd548d1db85fe.dll windows:5 windows x64 arch:x64
908746745c485828202e3664dddf55a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GlobalLock
GlobalSize
GlobalUnlock
GetFileAttributesExW
GetTickCount
DeviceIoControl
GetCurrentProcessId
GetLongPathNameW
GetWindowsDirectoryW
GetCurrentDirectoryW
MoveFileExW
SearchPathW
CreateThread
WaitForSingleObject
GetCurrentThreadId
GetVersion
GetSystemDefaultUILanguage
GetFileSize
GetLocalTime
VirtualProtect
GetModuleHandleExW
IsBadStringPtrW
ProcessIdToSessionId
OpenProcess
CreateProcessW
WTSGetActiveConsoleSessionId
MapViewOfFile
UnmapViewOfFile
GetProcessId
LocalAlloc
LocalFree
CreateFileMappingW
GetFileSizeEx
GlobalFree
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ResumeThread
GetSystemTimeAsFileTime
ReleaseMutex
GetSystemTime
SystemTimeToFileTime
SetFileAttributesW
DeleteFileW
OpenFileMappingW
OpenThread
GetCommandLineW
OutputDebugStringW
RtlPcToFileHeader
FormatMessageW
CreateFileA
LocalFileTimeToFileTime
SetFilePointerEx
HeapLock
HeapUnlock
HeapWalk
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetFileTime
GlobalAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
InterlockedFlushSList
ExitProcess
OpenMutexW
CreateMutexW
WideCharToMultiByte
FindResourceExW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
RaiseException
InitializeCriticalSection
lstrcmpiW
DeleteCriticalSection
SetLastError
CloseHandle
GetLastError
LoadLibraryW
GetSystemDirectoryW
SetFilePointer
GetVersionExW
GetSystemWindowsDirectoryW
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
GetFileInformationByHandle
CreateFileW
Sleep
ReadFile
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
LoadLibraryExW
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetFileAttributesW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
WriteFile
GetExitCodeProcess
IsDebuggerPresent
user32
IsZoomed
GetWindowTextW
SendMessageTimeoutW
SystemParametersInfoW
EnumDisplayDevicesW
GetLastInputInfo
GetClassNameW
GetShellWindow
GetWindowInfo
EnumWindows
WindowFromPoint
GetWindowRect
GetDesktopWindow
GetSystemMetrics
GetWindow
IsWindowVisible
CharNextW
FindWindowW
IsWindow
GetForegroundWindow
MonitorFromWindow
wsprintfW
GetWindowThreadProcessId
SetForegroundWindow
LoadStringW
GetAncestor
advapi32
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateProcessAsUserW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ChangeServiceConfigW
OpenServiceW
OpenSCManagerW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
FreeSid
GetLengthSid
SetTokenInformation
AllocateAndInitializeSid
CreateRestrictedToken
DuplicateTokenEx
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegEnumValueW
RegCreateKeyW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExA
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ord155
ord190
ord25
ord152
ShellExecuteExW
ShellExecuteW
ord165
SHGetSpecialFolderPathW
SHGetFileInfoW
SHGetDesktopFolder
SHGetMalloc
ord18
ole32
GetHGlobalFromStream
IIDFromString
StringFromGUID2
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
oleaut32
SysAllocStringByteLen
SafeArrayPutElement
VariantChangeType
VariantInit
SafeArrayCreate
SafeArrayGetElement
VariantClear
SysStringByteLen
SysFreeString
SysAllocString
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathAppendW
SHSetValueW
SHGetValueW
PathAddBackslashW
PathFileExistsW
StrCmpNIW
PathFindFileNameW
PathIsRelativeW
StrCpyNW
PathIsDirectoryW
StrPBrkA
StrPBrkW
StrStrIA
StrStrIW
PathFindExtensionW
SHEnumValueW
ord176
StrCmpIW
PathCombineW
StrRetToBufW
ws2_32
WSACleanup
WSCDeinstallProvider
WSCDeinstallProvider32
WSCUnInstallNameSpace
WSAGetLastError
WSAStartup
ntohl
htons
htonl
ntohs
version
VerQueryValueW
iphlpapi
GetIpAddrTable
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
psapi
GetModuleFileNameExW
msvcrt
wcstol
realloc
wcsspn
wcscspn
_mbsstr
_mbsrchr
_mktime64
towupper
memmove
memset
_CxxThrowException
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
memcpy
memcmp
wcscmp
_amsg_exit
__getmainargs
_initterm
__CxxFrameHandler
__DestructExceptionObject
_localtime64
___lc_codepage_func
rand
atoi
wcspbrk
__pctype_func
tolower
___mb_cur_max_func
strtol
localeconv
___lc_handle_func
abort
memchr
_wcstoui64
_msize
_XcptFilter
mbtowc
strrchr
iswctype
srand
ceil
log10
_clearfp
?terminate@@YAXXZ
_wtoi
malloc
free
wcsstr
wcschr
wcsncmp
__C_specific_handler
??_V@YAXPEAX@Z
??3@YAXPEAX@Z
_wtoi64
_wcsupr
_wcslwr
_strlwr
strchr
_time64
_wcsnicmp
??2@YAPEAX_K@Z
_wcsicmp
wcsrchr
calloc
iswspace
_errno
??_U@YAPEAX_K@Z
sqrt
Exports
Exports
CreateObject
homq
RegisterInstallTime
Sections
.text Size: 530KB - Virtual size: 530KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 669B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
wsgi2 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_MEM_READ