Static task
static1
Behavioral task
behavioral1
Sample
File-MAGIX-VEGAS-Pro-15_600151.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
File-MAGIX-VEGAS-Pro-15_600151.exe
Resource
win10v2004-20240704-en
General
-
Target
File-MAGIX-VEGAS-Pro-15_600151.exe
-
Size
7.7MB
-
MD5
473f436d1f3ddf6212e04b212aec75db
-
SHA1
af1e5be2ffe7c5b9a17779f212db52eca046fc85
-
SHA256
5dc0417c7fb0947bbfbdd6da01a18c9b2cf771f00fedd1510b41bc45b411a9b4
-
SHA512
47d3c5f265c0ba60196469605d8adde50698aca8935f23fc2454138043335da057a5be3d41048962a32b6f4250bdd9fc6eab07e29cde9ec3acd6d26a95e3c778
-
SSDEEP
196608:P288p8RT3OgtMwVajd4nXhE7OUGCZvb+CV4i8JRzY6SKt:P288+T3O6I2nXhE7OUGClb+CV4vDx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource File-MAGIX-VEGAS-Pro-15_600151.exe
Files
-
File-MAGIX-VEGAS-Pro-15_600151.exe.exe windows:6 windows x86 arch:x86
3edeaff8abef40c004b6f29fa270bade
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
LCMapStringW
SetStdHandle
FindClose
VirtualAlloc
TlsFree
GetTickCount
SetEvent
MoveFileExW
EnterCriticalSection
CreateFileW
GetCurrentDirectoryA
GetProcessAffinityMask
FindFirstFileW
SetLastError
GetProcAddress
FindNextFileW
SetFileAttributesW
GetSystemDirectoryW
GetModuleHandleW
HeapReAlloc
FormatMessageW
SetCurrentDirectoryW
RemoveDirectoryA
FreeEnvironmentStringsW
GetFileSize
UnhandledExceptionFilter
LoadLibraryA
ReadFile
WideCharToMultiByte
WakeAllConditionVariable
FreeLibraryAndExitThread
GetTempPathW
WriteConsoleW
GetACP
ReleaseSemaphore
TryAcquireSRWLockExclusive
HeapAlloc
SetFilePointerEx
CreateThread
TlsSetValue
GetCurrentThreadId
LocalFree
WaitForSingleObject
GetSystemInfo
IsProcessorFeaturePresent
GetVersionExA
TlsGetValue
LeaveCriticalSection
FindNextFileA
GlobalMemoryStatus
CloseHandle
CreateDirectoryA
GetFileType
CreateFileA
VirtualFree
HeapSize
GetCurrentDirectoryW
GetCurrentProcess
RaiseException
FindFirstFileA
GetModuleFileNameW
IsDebuggerPresent
QueryPerformanceFrequency
GetEnvironmentStringsW
LoadLibraryExW
SetCurrentDirectoryA
DeleteCriticalSection
GetProcessHeap
GetModuleFileNameA
GetCPInfo
CreateSemaphoreA
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetConsoleMode
RemoveDirectoryW
RtlUnwind
GetFileAttributesA
AcquireSRWLockExclusive
GetFileInformationByHandle
DeleteFileW
FlushFileBuffers
GetTickCount64
FindFirstFileExA
SetFilePointer
GetLastError
QueryPerformanceCounter
GetModuleHandleA
EncodePointer
InitializeCriticalSection
GetCurrentProcessId
LoadLibraryW
SetFileAttributesA
AreFileApisANSI
DecodePointer
GetModuleHandleExW
SetFileTime
CreateEventA
CreateDirectoryW
CreateProcessA
SetEndOfFile
ExitProcess
ResetEvent
IsBadReadPtr
DeleteFileA
IsValidCodePage
GetTempPathA
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
TerminateProcess
InitializeCriticalSectionEx
GetFileAttributesW
HeapFree
GetTempFileNameW
FormatMessageA
Sleep
GetOEMCP
WriteFile
GetStdHandle
GetVersion
GetCommandLineW
TlsAlloc
GetConsoleCP
GetStringTypeW
MultiByteToWideChar
InitializeSListHead
ExitThread
InitializeCriticalSectionAndSpinCount
user32
DialogBoxParamA
CharUpperW
LoadStringA
LoadIconA
SetWindowTextA
CharUpperA
KillTimer
GetDlgItem
DialogBoxParamW
EndDialog
MessageBoxA
GetWindowLongA
SetTimer
ShowWindow
LoadStringW
SetWindowLongA
MessageBoxW
SendMessageA
PostMessageA
DestroyWindow
SetWindowTextW
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
advapi32
CloseServiceHandle
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 570KB - Virtual size: 582KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ