C:\vmagent_new\bin\joblist\720987\out\Release\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07.exe
Resource
win10v2004-20240426-en
General
-
Target
ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07
-
Size
7.1MB
-
MD5
d1b37241d672f2b34fcc787b35ef7d15
-
SHA1
26c569e931ddf9282eb9e65057090a211a3c657a
-
SHA256
ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07
-
SHA512
7b688c5912a947e7527f36cd900c6a36b79efe74d32c6901a951ec85feb793aca172d5edf172aacb99c2a05861f0c097437ee0fe4672440297579bd1e8dadd20
-
SSDEEP
196608:4zgaIeMjUL2PE3c7FPkdEKypyJkDtjnGEj:48aI3j82sM8myJIBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07
Files
-
ab300847186347a87ff0440c85e1dc083c9ff3c11c51c599daf87d466bd1ec07.exe windows:5 windows x86 arch:x86
e85dd3214611ff80022e8e2097c2d409
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetTempPathW
GetLocalTime
GetCurrentProcessId
DeviceIoControl
FindClose
FindNextFileW
CopyFileW
FindFirstFileW
GetLogicalDriveStringsW
GetWindowsDirectoryW
GetSystemDirectoryW
GetFileAttributesW
GetExitCodeProcess
RemoveDirectoryW
DeleteFileW
GetTempFileNameW
lstrcatW
InterlockedExchange
MoveFileExW
MoveFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetThreadPriority
ResumeThread
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
CreateMutexW
ReadFile
GetFileSize
TlsFree
ReleaseMutex
CreateMutexA
GetModuleHandleA
ProcessIdToSessionId
Thread32Next
SuspendThread
OpenThread
Thread32First
GlobalMemoryStatus
SystemTimeToFileTime
FileTimeToSystemTime
SetEnvironmentVariableW
WritePrivateProfileSectionW
QueryDosDeviceW
ReadProcessMemory
Module32NextW
Module32FirstW
GetPrivateProfileIntW
InterlockedCompareExchange
GetFileAttributesExW
TlsSetValue
TlsGetValue
GetCommandLineW
GetLongPathNameW
lstrcmpW
GetACP
TerminateProcess
GetPrivateProfileSectionW
GetTimeZoneInformation
GetCurrentProcess
GetFileTime
SetFilePointer
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetLocaleInfoW
SetConsoleCtrlHandler
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
HeapCreate
FatalAppExitA
GetCurrentThread
TlsAlloc
GetModuleFileNameA
GetStdHandle
GetStartupInfoW
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetStdHandle
MultiByteToWideChar
FreeLibrary
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
FlushInstructionCache
SetEnvironmentVariableA
FreeResource
LocalFileTimeToFileTime
SetFilePointerEx
SetLastError
InterlockedDecrement
InterlockedIncrement
GetLastError
CreateFileMappingW
GetFileSizeEx
OutputDebugStringW
HeapUnlock
HeapLock
HeapWalk
MapViewOfFile
lstrlenW
lstrcpyW
AreFileApisANSI
WideCharToMultiByte
Sleep
FindResourceExW
FindResourceW
LoadResource
LockResource
UnmapViewOfFile
SetFileTime
LoadLibraryExW
GetCurrentThreadId
lstrcmpiW
CreateThread
WaitForSingleObject
TerminateThread
ExpandEnvironmentStringsW
CreateFileW
WriteFile
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceExW
GetVersionExW
GetVersion
GetModuleHandleW
GetProcAddress
GetLocaleInfoA
SizeofResource
RaiseException
GetTickCount
CreateDirectoryW
SetFileAttributesW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
FileTimeToLocalFileTime
GetStringTypeW
user32
RegisterClassExW
MoveWindow
GetWindowRgn
EnumThreadWindows
WindowFromPoint
GetSystemMetrics
SwitchToThisWindow
SetForegroundWindow
BringWindowToTop
UnregisterClassA
SendMessageTimeoutW
FindWindowW
ClientToScreen
GetSysColor
SetCursor
FillRect
CallWindowProcW
GetDlgCtrlID
SetCapture
IsWindowEnabled
UpdateWindow
ReleaseCapture
PtInRect
CreateDialogParamW
WaitForInputIdle
CharLowerBuffW
LoadCursorW
SetRectEmpty
DestroyCursor
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadImageW
GetClassNameW
CreateCursor
PostQuitMessage
OffsetRect
CharNextW
GetCursorPos
LoadStringW
DrawTextW
GetWindow
SystemParametersInfoW
MapWindowPoints
IsWindow
AdjustWindowRectEx
IsDialogMessageW
MessageBoxW
GetDlgItem
GetParent
ChildWindowFromPoint
SetDlgItemTextW
GetDlgItemTextW
SetFocus
EnableWindow
KillTimer
SetTimer
ShowWindow
InvalidateRect
ReleaseDC
GetWindowDC
GetDC
EndPaint
BeginPaint
ScreenToClient
GetWindowRect
GetMenu
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
PostMessageW
GetWindowLongW
CreateWindowExW
SetWindowLongW
DestroyWindow
SendMessageW
ExitWindowsEx
SetWindowPos
GetClientRect
GetCapture
gdi32
GetPixel
DeleteDC
Rectangle
SetTextColor
SetBkMode
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
StretchBlt
CreatePen
CreateBrushIndirect
PtInRegion
CreateRectRgn
CreateDIBSection
BitBlt
SetStretchBltMode
advapi32
EqualSid
OpenProcessToken
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
IsValidSid
FreeSid
AllocateAndInitializeSid
GetTokenInformation
GetUserNameW
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHFileOperationW
ord165
SHGetFolderPathW
SHCreateDirectoryExW
SHChangeNotify
ShellExecuteExW
CommandLineToArgvW
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemRealloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
shlwapi
PathAppendW
StrCmpNIW
SHDeleteKeyW
SHDeleteValueW
StrCmpNW
PathRemoveFileSpecW
SHSetValueW
PathFindFileNameW
StrStrIW
PathCombineW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
PathRemoveBackslashW
SHGetValueW
comctl32
_TrackMouseEvent
ImageList_Destroy
InitCommonControlsEx
ImageList_GetIconSize
ws2_32
closesocket
htons
socket
gethostbyname
connect
WSAStartup
setupapi
SetupIterateCabinetW
psapi
GetModuleFileNameExW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
crypt32
CertGetNameStringW
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
msimg32
AlphaBlend
Sections
.text Size: 642KB - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55.8MB - Virtual size: 55.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ