C:\vmagent_new\bin\joblist\545749\out\Release\360ZipSandbox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2.exe
Resource
win7-20240704-en
General
-
Target
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2
-
Size
592KB
-
MD5
1857eaefa9893bfa3cf8ee0b9c5a1a47
-
SHA1
91b2a76ce82a5a1094abf9ee0ee18ca4e1c1abc7
-
SHA256
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2
-
SHA512
43a1749b36cf84155e8ca1f3f0aeaea223bbbf38824a1402208f8c199ae5b7dbfa1c40bdcaaa3c99eb4ddee34a883d4a19953df3b8fd2eac2033061fdd0edcd5
-
SSDEEP
12288:uMYts2jbSPPIBb/7h636HcB3Xf3SUiwV3es9yh+:dYvRHcBHqe8s9yh+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2
Files
-
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2.exe windows:5 windows x86 arch:x86
4156d16573afebc11e64fd1f1077d1ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualQuery
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SetThreadPriority
GetThreadPriority
GetThreadContext
SuspendThread
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
CloseHandle
GetSystemInfo
GetModuleHandleW
DecodePointer
RaiseException
VirtualProtect
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FindClose
GetModuleFileNameW
GetSystemDirectoryW
CreateFileW
FindFirstFileW
FindNextFileW
GetFileSizeEx
ReadFile
SetFilePointer
WideCharToMultiByte
FreeLibrary
SetUnhandledExceptionFilter
DeviceIoControl
LoadLibraryW
LoadLibraryExW
GetEnvironmentVariableW
GetVersionExW
VirtualAlloc
FlushInstructionCache
GetProcAddress
GetLastError
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
IsProcessorFeaturePresent
UnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
WriteFile
SetFilePointerEx
LocalFileTimeToFileTime
CreateFileA
SystemTimeToFileTime
SetLastError
TlsSetValue
HeapFree
HeapLock
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapWalk
TlsAlloc
HeapAlloc
GetProcessHeap
TlsGetValue
TlsFree
HeapUnlock
RtlUnwind
EncodePointer
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
ExitProcess
MultiByteToWideChar
GetACP
WaitForSingleObjectEx
CreateThread
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetStringTypeW
GetCurrentThread
user32
GetMessageW
GetInputState
PostThreadMessageW
shlwapi
PathRemoveFileSpecW
StrStrIA
StrStrIW
PathMatchSpecW
PathCombineW
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
Exports
Exports
_lock@8
_unlock@8
Sections
.text Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 155KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE