Z:\Ventoy\Plugson\vs\VentoyPlugson\Release\VentoyPlugson.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44d219e6fa71fe2a4f035ccd1c8489546b55909931b2887b37317005fb11810c.exe
Resource
win7-20240419-en
General
-
Target
44d219e6fa71fe2a4f035ccd1c8489546b55909931b2887b37317005fb11810c
-
Size
440KB
-
MD5
e1d01dc8234ad0cbb0baa7e8c29c03eb
-
SHA1
850d7c86d6d3bfa7c15e01928a56176c4aa7f294
-
SHA256
44d219e6fa71fe2a4f035ccd1c8489546b55909931b2887b37317005fb11810c
-
SHA512
e869f1ced2fe180b2edbe7a5a38b0713d84fd98ec7a74c85b75803b67d58e77b213a13775af8c17f5f8bbb8957eade6626a12de29cdd285f6549a23ecb8642bf
-
SSDEEP
12288:2/JFiCtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjc8NO0qwxeWfF02/S0lqJ+:+cl3+N0DvfeUYqcZQCGm4YprEH7aQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44d219e6fa71fe2a4f035ccd1c8489546b55909931b2887b37317005fb11810c
Files
-
44d219e6fa71fe2a4f035ccd1c8489546b55909931b2887b37317005fb11810c.exe windows:6 windows x86 arch:x86
1df7cfa71495a8d5833182c6005b7af9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLogicalDrives
CreateMutexA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CloseHandle
ReadFile
GetFileInformationByHandleEx
WriteFile
DeviceIoControl
GetUserDefaultUILanguage
GetVolumeInformationA
CreateFileW
GetFileAttributesW
MultiByteToWideChar
CopyFileA
GetLastError
GetFileAttributesA
CreateFileA
SetEvent
CreateThread
SetFilePointerEx
GetFileSize
WideCharToMultiByte
CreateEventA
FlushFileBuffers
CreateDirectoryW
FindFirstFileW
SetHandleInformation
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
GetLongPathNameW
GetCurrentProcess
TerminateProcess
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
FindClose
GetCurrentThreadId
DuplicateHandle
GetVersion
Sleep
GetFileAttributesExW
GetCurrentThread
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
FreeLibrary
TlsGetValue
CreateProcessA
GetSystemTimeAsFileTime
TlsFree
QueryPerformanceCounter
MoveFileA
LoadLibraryExA
GetModuleFileNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetDllDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryA
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
DecodePointer
GetExitCodeProcess
HeapReAlloc
GetConsoleOutputCP
RemoveDirectoryW
GetFileSizeEx
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
HeapAlloc
HeapFree
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetStdHandle
GetFileType
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetConsoleMode
ReadConsoleW
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreatePipe
GetCommandLineA
GetCommandLineW
GetStdHandle
ExitProcess
user32
GetDlgItem
LoadIconA
SendMessageA
DialogBoxParamA
SetWindowTextW
EndDialog
MessageBoxW
EnableWindow
ws2_32
WSAStartup
getsockname
send
socket
ntohs
shutdown
htons
ioctlsocket
getnameinfo
setsockopt
listen
ntohl
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
recv
htonl
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ