C:\vmagent_new\bin\joblist\435521\out\Release\360DeskAna64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f.exe
Resource
win10v2004-20240709-en
General
-
Target
2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f
-
Size
531KB
-
MD5
e75a3a0499c7dc4c92e8133537ec3eb8
-
SHA1
2688cb970719355afab1bb1d375579e3ffce9001
-
SHA256
2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f
-
SHA512
fb5e1f3a02cdfea4b487fc5038ff2f243b93855f4ef6f28b9758af9ab6480f27366f7f854405e1ab38b6c16337c7ee0b936cadbf2a86837f9fb3509f21a78f39
-
SSDEEP
6144:qB1uW1R0nmQoHypC2leYdlzzew59CEJI/fsAEVkPf6wU8c1r0Oy1rCNQaqofW:w1uSRkhD7VqOI/Ec08ctlpf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f
Files
-
2707610b0eba853264e3cce793b35162d40359a57ff94d998a31524bc12a508f.exe windows:5 windows x64 arch:x64
23503c44ca8af8fe109b5d8055f22070
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shell32
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
kernel32
OpenEventW
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetExitCodeThread
OpenFileMappingW
MapViewOfFile
GetProcessId
UnmapViewOfFile
IsProcessInJob
QueryInformationJobObject
LoadLibraryW
GetCommandLineW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
ProcessIdToSessionId
GetCurrentProcessId
GetSystemDirectoryW
SetLastError
MultiByteToWideChar
LoadLibraryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
CreateFileMappingW
CreateEventW
HeapCreate
GlobalFree
EnterCriticalSection
DeviceIoControl
LeaveCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
ReadProcessMemory
IsDebuggerPresent
SetEvent
CreateFileW
GlobalAlloc
ReadFile
GetModuleFileNameW
ExpandEnvironmentStringsW
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
TlsAlloc
LoadLibraryExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
GetCurrentProcess
TerminateProcess
Sleep
CreateProcessW
GetVersionExW
CloseHandle
OpenProcess
GetModuleHandleW
GetProcAddress
LocalFileTimeToFileTime
CreateFileA
OutputDebugStringW
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetFileSizeEx
VirtualProtect
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
ResetEvent
OpenThread
GetCurrentThreadId
CreateMutexW
ReleaseMutex
WriteFile
WaitForSingleObject
SetFilePointerEx
WideCharToMultiByte
HeapWalk
HeapUnlock
HeapLock
user32
FindWindowW
WaitForInputIdle
GetWindowThreadProcessId
advapi32
GetUserNameW
RegEnumKeyExW
RegQueryValueExA
RegQueryValueExW
LookupPrivilegeValueW
RevertToSelf
CreateProcessAsUserW
ImpersonateLoggedOnUser
DuplicateTokenEx
GetTokenInformation
RegCloseKey
RegOpenKeyExW
OpenProcessToken
SetNamedSecurityInfoW
LookupAccountNameW
LookupAccountSidW
AdjustTokenPrivileges
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
StringFromGUID2
CoUninitialize
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
shlwapi
PathAppendW
StrStrIW
PathFindFileNameW
ws2_32
WSCDeinstallProvider32
WSCGetProviderPath
WSCEnumProtocols
WSCDeinstallProvider
WSACleanup
WSAStartup
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
msvcrt
atexit
__setusermatherr
_initterm
exit
_exit
_c_exit
__CxxFrameHandler
_wcslwr
__pctype_func
tolower
___mb_cur_max_func
wcstol
strtol
localeconv
_wfopen
___lc_codepage_func
_lock
_unlock
_iob
_errno
memcpy
__dllonexit
__set_app_type
_wcmdln
_XcptFilter
_fmode
_commode
mbtowc
___lc_handle_func
strrchr
_isatty
fflush
_fileno
abort
_wtoi
??_V@YAXPEAX@Z
??_U@YAPEAX_K@Z
_wcsicmp
_wcstoui64
iswctype
??2@YAPEAX_K@Z
ceil
log10
_clearfp
?terminate@@YAXXZ
fputc
fwrite
wcscmp
memcmp
_CxxThrowException
_cexit
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
memset
memmove
malloc
fclose
fseek
fread
free
wcschr
wcsstr
__C_specific_handler
calloc
??3@YAXPEAX@Z
__wgetmainargs
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 350KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 328B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ