C:\jdk7_32P\jdk7\build\windows-i586\tmp\ssvagent\obj\ssvagent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c.exe
Resource
win10v2004-20240704-en
General
-
Target
2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c
-
Size
272KB
-
MD5
5162d64819d5ddd0528f8f85c80363d6
-
SHA1
3d42429fc36a670547022a1b277df62271e23cf3
-
SHA256
2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c
-
SHA512
036819cdf3eed95faa1bea9408c32d423975012cfa954db5c0d8368eb6ed7139cdcddb3f93e2a02424b492f332f06e2ece986e698c528eab8bd2ea93b18d029d
-
SSDEEP
6144:qYY8jBo1Vves1OFlTL7x0kp5lNjX6KLVnNGNOzr/rojLkfm:qB8jq1VveNv7x0MPjDp8Wr/rCkfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c
Files
-
2c591182a3ecf75832f964d84f46a6e1795cd71f54dd275adf7f8d94c8e8f96c.exe windows:5 windows x86 arch:x86
5020a430330e0508fe5684f335f5f89e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetProcAddress
GetModuleHandleA
FreeLibrary
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
GetVersionExA
CloseHandle
CreateFileA
GetSystemDirectoryA
LocalAlloc
FormatMessageA
GetLongPathNameA
GetShortPathNameA
GetTempFileNameA
GetTempPathA
OutputDebugStringA
GetCurrentProcessId
GetCurrentThreadId
LocalFree
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
DecodePointer
EncodePointer
InterlockedExchange
user32
wsprintfA
CharNextA
ole32
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoTaskMemRealloc
oleaut32
SysAllocString
VarUI4FromStr
SysFreeString
VariantClear
msvcr100
strcpy_s
memset
strcat_s
_local_unwind4
__argc
__argv
_mbsnbcpy_s
_mbsstr
malloc
free
memcpy_s
_CxxThrowException
_resetstkoflw
__CxxFrameHandler3
_recalloc
??_U@YAPAXI@Z
??2@YAPAXI@Z
_splitpath_s
sprintf_s
strncpy
fopen_s
fclose
fprintf_s
_localtime64
_snprintf_s
strftime
_ftime64_s
_vsnprintf_s
memcpy
_except_handler4_common
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
_mbscmp
??3@YAXPAX@Z
??_V@YAXPAX@Z
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 227KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ