Z:\Ventoy\Ventoy2Disk\ARM\Release\Ventoy2Disk_ARM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442.exe
Resource
win10v2004-20240508-en
General
-
Target
d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442
-
Size
366KB
-
MD5
8d7dbdaf67f229633936e65f493dcb49
-
SHA1
7f3d7757be23ea2e734f0226fb7223c1fcd2f591
-
SHA256
d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442
-
SHA512
0888746d0d93a745c0a875d6fdf591c7f97ad275c461d5e1af8910978bb81c273ddd5874539aefe49fbaab105da8cf7161e33ff8d7ee48e083c7ed1bad38b69f
-
SSDEEP
6144:ZszK0A8SNYrpYfhCw0scYQ3dk3Us/DbVao4qqPIBXtHSWENLVxOR3FE9:ZsI8SNYrqfhCwdcObnVWqqPIBONhxsVy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442
Files
-
d9d04526e7646220dac1731773b9feb56f9ee921be76359668268fc55bae2442.exe windows:6 windows
2df77780f84c436193716a9a9853d1f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
WaitForSingleObject
GetCurrentDirectoryA
DeleteFileA
CloseHandle
GetStartupInfoA
GetCurrentProcessId
CreateProcessA
SetLastError
GetVolumeNameForVolumeMountPointA
Sleep
FormatMessageW
WideCharToMultiByte
DeviceIoControl
VerSetConditionMask
VerifyVersionInfoW
ReadFile
WriteFile
SetFilePointerEx
GetLogicalDrives
DeleteVolumeMountPointA
SetFilePointer
QueryDosDeviceA
FindFirstVolumeA
GetTickCount64
SetVolumeMountPointA
CreateFileA
GetLogicalDriveStringsA
FindNextVolumeA
FindVolumeClose
GetCurrentProcess
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
GetModuleHandleA
LoadLibraryA
GetNativeSystemInfo
GetProcAddress
ReadProcessMemory
QueryFullProcessImageNameW
GetFileType
IsWow64Process
VerifyVersionInfoA
GetProductInfo
GetFileAttributesA
GetVersionExA
GetLocalTime
GetSystemWow64DirectoryA
GetVolumeInformationA
GetPrivateProfileIntA
lstrlenW
GetSystemDefaultUILanguage
GetPrivateProfileIntW
LoadLibraryExA
CreateFileW
GetPrivateProfileSectionNamesW
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
GetPrivateProfileStringW
GetDiskFreeSpaceA
Process32NextW
SetDllDirectoryA
Process32FirstW
LoadLibraryW
CreateThread
GetWindowsDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileSize
lstrcpyW
lstrcmpW
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetEndOfFile
ReadConsoleW
LCMapStringW
LoadLibraryExW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetCommandLineA
GetCommandLineW
GetStdHandle
GetModuleFileNameW
ExitProcess
TerminateProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
GetMenuState
ModifyMenuW
LoadMenuW
GetMenu
DeleteMenu
GetSubMenu
ShowWindow
SetWindowTextA
SendDlgItemMessageW
IsWindowEnabled
SetMenu
LoadIconW
SendMessageA
wsprintfW
SetFocus
AppendMenuW
DialogBoxParamW
UpdateWindow
InvalidateRect
GetSystemMetrics
MessageBoxW
CheckRadioButton
SendMessageW
EndDialog
SetWindowTextW
GetWindowTextA
GetDlgItem
EnableWindow
CheckMenuItem
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ