vssagent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16e90376c6bb8221093404649a799221b3acdcca9ddaf8199a2b2ba1c17afb64.exe
Resource
win10v2004-20240508-en
General
-
Target
16e90376c6bb8221093404649a799221b3acdcca9ddaf8199a2b2ba1c17afb64.exe
-
Size
1.5MB
-
MD5
f087abf35d7f8c7a5e5b015253b9c050
-
SHA1
0495d563554f3d9050a5dfa060e0d7f383356d00
-
SHA256
16e90376c6bb8221093404649a799221b3acdcca9ddaf8199a2b2ba1c17afb64
-
SHA512
a6b440ebe8c7c581c93ee426d922c4bf145d612d72303cc827fd7b35700fb5f99a1f0ebd4822cccc0dcc5453cc486b38fdaf722184284b6a543679f8116f8a7e
-
SSDEEP
24576:g55eP8GkI0kX+pNrfSPGcymOO5NI4h95O:dNkI/uj1tObh95O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16e90376c6bb8221093404649a799221b3acdcca9ddaf8199a2b2ba1c17afb64.exe
Files
-
16e90376c6bb8221093404649a799221b3acdcca9ddaf8199a2b2ba1c17afb64.exe.exe windows:10 windows x86 arch:x86
828091e4eb8bc2f38a566c67559fc82d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
OpenEventLogW
ReadEventLogW
CloseEventLog
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
ControlService
CloseServiceHandle
OpenProcessToken
ConvertSidToStringSidW
RegDeleteTreeW
RegQueryValueExW
ReportEventW
RegisterEventSourceW
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
DeregisterEventSource
OpenThreadToken
GetTokenInformation
kernel32
GetSystemInfo
GlobalMemoryStatusEx
QueryDosDeviceW
CloseHandle
CreateFileW
GetVolumeNameForVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
GetDriveTypeW
GetVolumePathNameW
GetDiskFreeSpaceExW
GetVolumeInformationW
FindVolumeClose
CopyFileW
GetFullPathNameW
ExpandEnvironmentStringsW
FindFirstFileW
FindNextFileW
GetSystemTimeAsFileTime
WideCharToMultiByte
WriteFile
LoadLibraryExW
FindClose
LeaveCriticalSection
EnterCriticalSection
GetVersionExW
SetConsoleCtrlHandler
GetModuleHandleW
InitializeCriticalSection
SetFilePointer
ReadFile
DeleteCriticalSection
CreateMutexW
ReleaseMutex
GetStdHandle
GetConsoleMode
SetConsoleMode
FreeLibrary
GetProcAddress
lstrcmpiW
lstrcpynW
VirtualProtect
VirtualAlloc
VirtualQuery
GetCurrentProcess
LoadResource
FindResourceExW
lstrcpyW
Sleep
HeapDestroy
GetComputerNameExW
AcquireSRWLockShared
ReleaseSRWLockShared
InitializeSRWLock
GetCurrentThread
GetSystemTime
TlsFree
TlsGetValue
TlsAlloc
OutputDebugStringW
TlsSetValue
lstrlenW
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
OutputDebugStringA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetWindowsDirectoryW
GetModuleFileNameW
DeleteFileW
MultiByteToWideChar
LocalAlloc
GetTimeFormatW
GetThreadLocale
GetDateFormatW
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
GetLastError
DeviceIoControl
FormatMessageW
GetCommandLineW
GetNativeSystemInfo
SizeofResource
IsWow64Process
HeapSetInformation
GetTickCount
msvcrt
memcmp
memcpy
_except_handler4_common
_controlfp
_onexit
__dllonexit
_unlock
_lock
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__p__commode
_XcptFilter
_CxxThrowException
_callnewh
_wtoi
wcscpy_s
wcscat_s
malloc
fflush
??0exception@@QAE@XZ
memmove_s
??0exception@@QAE@ABQBD@Z
memcpy_s
iswalnum
qsort
free
realloc
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
_purecall
wcsncmp
_wcsicmp
wcschr
iswspace
_vsnwprintf
wprintf
__CxxFrameHandler3
__iob_func
_wcsnicmp
_vsnprintf
_amsg_exit
memset
ole32
CoResumeClassObjects
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemRealloc
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CoInitializeSecurity
CoInitializeEx
CoUninitialize
user32
KillTimer
SetTimer
RegisterDeviceNotificationW
PostMessageW
UnregisterClassW
DestroyWindow
CharNextW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
DefWindowProcW
LoadStringW
FindWindowW
DispatchMessageW
CharPrevW
UnregisterDeviceNotification
oleaut32
VariantClear
SysStringLen
SysAllocString
VariantChangeType
GetErrorInfo
SysFreeString
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
rpcrt4
RpcStringFreeW
UuidToStringW
shlwapi
PathFileExistsW
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiCreateDeviceInfoList
SetupDiOpenDeviceInterfaceW
SetupDiEnumDeviceInterfaces
vssapi
CreateVssBackupComponentsInternal
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
clusapi
OpenCluster
CloseCluster
api-ms-win-security-lsalookup-l1-1-0
LookupAccountSidLocalW
Sections
.text Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE