F:\Ventoy\Ventoy2Disk\x64\Release\Ventoy2Disk_X64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5be69660bd765ba02086311def8506ded9cf8538af03c7e4121fbda31d1fd4b.exe
Resource
win7-20240704-en
General
-
Target
a5be69660bd765ba02086311def8506ded9cf8538af03c7e4121fbda31d1fd4b
-
Size
1.2MB
-
MD5
10421863e5e5dc1dd3f9209144501c9e
-
SHA1
bbf743137b5242c6b681dae57e960422d5f3eeb5
-
SHA256
a5be69660bd765ba02086311def8506ded9cf8538af03c7e4121fbda31d1fd4b
-
SHA512
c2685f7d2a509fda475a492016ddb4eb3534b3c8ca613c9dce4310fe78394b390fd312f0ebba6d7a86e45dbe2d380ca53575b95550320cf91e3bed98682104af
-
SSDEEP
24576:Uwk//wQ+MI/xsU5AsqjnhMgeiCl7G0nehbGZpbD:jk//f+ZxsfDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5be69660bd765ba02086311def8506ded9cf8538af03c7e4121fbda31d1fd4b
Files
-
a5be69660bd765ba02086311def8506ded9cf8538af03c7e4121fbda31d1fd4b.exe windows:6 windows x64 arch:x64
3b7bcc5aa92557566b18f14544f36e3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetLastError
GetUserDefaultUILanguage
GetSystemDirectoryW
LCIDToLocaleName
MultiByteToWideChar
GetLastError
LockResource
LoadLibraryW
LoadResource
FindResourceW
FreeLibrary
WideCharToMultiByte
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
GetDriveTypeW
GetVolumeInformationA
WaitForSingleObject
GetCurrentDirectoryA
DeleteFileA
CloseHandle
GetStartupInfoA
GetCurrentProcessId
CreateProcessA
GetVolumeNameForVolumeMountPointA
Sleep
FormatMessageW
DeviceIoControl
ReadFile
WriteFile
SetFilePointerEx
GetLogicalDrives
DeleteVolumeMountPointA
SetFilePointer
QueryDosDeviceA
FindFirstVolumeA
GetTickCount64
SetVolumeMountPointA
CreateFileA
GetLogicalDriveStringsA
FindNextVolumeA
FindVolumeClose
GetCurrentProcess
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
GetModuleHandleA
GetNativeSystemInfo
ReadProcessMemory
QueryFullProcessImageNameW
GetFileType
IsWow64Process
VerifyVersionInfoA
GetProductInfo
GetFileAttributesA
GetVersionExA
GetLocalTime
GetSystemWow64DirectoryA
VerSetConditionMask
GetDiskFreeSpaceA
GetPrivateProfileIntA
lstrlenW
GetSystemDefaultUILanguage
GetPrivateProfileIntW
LoadLibraryExA
GetModuleFileNameW
CreateFileW
GetPrivateProfileSectionNamesW
OpenProcess
CreateToolhelp32Snapshot
GetPrivateProfileStringW
Process32NextW
SetDllDirectoryA
Process32FirstW
CreateThread
GetWindowsDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileSize
lstrcpyW
lstrcmpW
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
LCMapStringW
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
HeapFree
HeapAlloc
GetModuleHandleExW
ExitProcess
GetStdHandle
GetCommandLineW
GetCommandLineA
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
user32
GetMenuState
ModifyMenuW
LoadMenuW
GetMenu
CreateWindowExW
DeleteMenu
ScreenToClient
GetSubMenu
ShowWindow
SetWindowTextA
SendDlgItemMessageW
IsWindowEnabled
MoveWindow
SetMenu
SetFocus
LoadIconW
wsprintfW
CheckMenuItem
AppendMenuW
GetSystemMetrics
UpdateWindow
LoadImageW
GetWindowRect
MessageBoxW
CheckRadioButton
EndDialog
SetWindowTextW
GetWindowTextA
SendMessageA
GetDlgItem
InvalidateRect
EnableWindow
EnumChildWindows
SendMessageW
GetWindowLongPtrW
LoadStringW
SetWinEventHook
GetWindowTextW
DialogBoxParamW
Sections
.text Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE