d:\Jenkins2\jobs\MagixFX\workspace\_Plugins\Vandal_SE\Vandal_SE.pdb
Static task
static1
Behavioral task
behavioral1
Sample
77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e.dll
Resource
win10v2004-20240419-en
General
-
Target
77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e
-
Size
5.8MB
-
MD5
116265ed77a18ee39ccc54f06bc6b881
-
SHA1
3425f53dbd2e690f0bba53e64ed1ac053cebd959
-
SHA256
77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e
-
SHA512
73a04e2a0b4b7950d649f5da37916c861cc01319c0975e9f3c416be4b2c7e492c209d088f143478104572aab65c44705528db08f900873f485f003d51ab5b950
-
SSDEEP
98304:netyQfESxHs1/RLwFzX/kmjESVSqVdg4hBBJUcCgJwAFJRTvXr:etyQfEjp2lnzMq/g4VAgeAFTXr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e
Files
-
77fe8609bac92f97dfda0a3570130c3d4641cca4910f5250830902f85cca372e.dll regsvr32 windows:5 windows x86 arch:x86
ce1461b089eee263a705f0fbaae36d51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
SetHandleCount
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
LoadLibraryW
IsValidCodePage
GetACP
VirtualFree
HeapDestroy
HeapCreate
LCMapStringW
LCMapStringA
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
ExitProcess
VirtualAlloc
HeapSize
QueryPerformanceCounter
HeapAlloc
HeapReAlloc
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStdHandle
GetFileType
WriteConsoleW
RtlUnwind
HeapFree
InterlockedExchangeAdd
OutputDebugStringA
GetLocalTime
GetModuleHandleExW
CreateFileW
GetFileAttributesW
CreateDirectoryW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetProcessHeap
GetFileAttributesA
CreateFileA
GetCurrentProcess
GetFileSize
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetModuleHandleW
GetOEMCP
GetCPInfo
GetCurrentProcessId
GetLocaleInfoA
InterlockedExchange
InterlockedIncrement
GlobalFlags
lstrcmpA
FormatMessageA
SetErrorMode
lstrlenA
CreateEventA
SetEvent
WaitForSingleObject
CloseHandle
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalFree
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
lstrcmpW
GetModuleHandleA
FreeLibrary
GetVersionExA
LoadLibraryA
GetProcAddress
GlobalLock
GlobalSize
GlobalUnlock
GlobalFree
MultiByteToWideChar
FindResourceA
SizeofResource
LoadResource
EnterCriticalSection
LockResource
GetLastError
WideCharToMultiByte
Sleep
FindFirstFileA
FindNextFileA
FindClose
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
GetModuleFileNameA
GetPrivateProfileStringA
LeaveCriticalSection
GetCommandLineA
user32
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
LoadIconA
RegisterWindowMessageA
ValidateRect
CheckMenuItem
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
EnableMenuItem
GetMenuState
ModifyMenuA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
MessageBoxA
GetActiveWindow
DispatchMessageA
PeekMessageA
MessageBoxW
KillTimer
CallWindowProcA
GetWindowLongA
GetDoubleClickTime
SetFocus
SendMessageA
SetWindowLongA
CreateWindowExA
DestroyWindow
SetWindowTextA
IsWindowEnabled
ClientToScreen
TabbedTextOutA
DrawTextExA
GrayStringA
PostQuitMessage
GetWindowThreadProcessId
GetSysColorBrush
SetMenu
EnableWindow
SetForegroundWindow
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
PtInRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
RegisterClassExA
GetClientRect
RegisterClassA
GetSystemMetrics
GetClassNameA
SetWindowPos
DefWindowProcA
GetUpdateRgn
BeginPaint
EndPaint
GetKeyState
SetCapture
ReleaseCapture
GetDC
TrackMouseEvent
UnregisterClassA
LoadImageA
LoadBitmapA
InvalidateRect
GetCursor
LoadCursorA
SetCursor
GetAsyncKeyState
GetCursorPos
MapWindowPoints
GetParent
DrawTextA
FillRect
ReleaseDC
GetWindowRect
DestroyMenu
GetWindowTextA
gdi32
MoveToEx
CreateRectRgn
SelectClipRgn
SetROP2
CreatePenIndirect
SelectObject
DeleteObject
CreateFontIndirectA
CreateBitmap
GetCurrentObject
DPtoLP
GetTextMetricsA
CreatePen
Rectangle
GetClipBox
GetDeviceCaps
ExtTextOutA
SaveDC
RestoreDC
SetMapMode
SetTextColor
LineTo
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
Polygon
GetStockObject
SetPixel
CreateBrushIndirect
SetBkColor
GetTextExtentPoint32A
SetBkMode
GetPixel
DeleteDC
BitBlt
CreateDIBSection
GetObjectA
CreateCompatibleBitmap
CreateCompatibleDC
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
DragQueryFileA
ole32
RevokeDragDrop
RegisterDragDrop
CoCreateInstance
OleInitialize
OleUninitialize
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
shlwapi
PathFindFileNameA
PathFindExtensionA
oleacc
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
DllRegisterServer
DllUnregisterServer
ProteinRegister
VSTPluginMain
main
Sections
.text Size: 731KB - Virtual size: 730KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ