C:\vmagent_new\bin\joblist\826517\out\Release\Player.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc.exe
Resource
win10v2004-20240802-en
General
-
Target
9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc
-
Size
1.7MB
-
MD5
461c97578eb0cacde9c625c4b7d24157
-
SHA1
a046b94e0e5ed3ce781bbf6cdac78e4fafa17729
-
SHA256
9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc
-
SHA512
0fc9e1bb2b188ad4ba11fa636fa09e6e2a7cd11f8c66b390a96e221cce189e05f4efd9c351e48d8da0f09b9f40f28cadca91a0cdf5ade454220ef2f978b1576c
-
SSDEEP
24576:qSUk3FMlJoirgzvUcQXxD3C9UKM7dxwW6qkpwVdsyoN0dOsaSaCa3n0B9EFHCEje:2JsvFQX9Jhdf6qDu8OsR0nvDCKcsi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc
Files
-
9b02b9c888a3ffce971d7d64e90b8b4fc124cbc2e146d19ae00785c11879f8cc.exe windows:5 windows x86 arch:x86
217009c4f017911e73099ee18e51b3a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEndOfFile
FindClose
GetWindowsDirectoryW
FindNextFileW
GetCurrentProcess
OpenThread
lstrcmpiW
GetModuleHandleExW
GlobalSize
GlobalLock
GlobalUnlock
GetThreadLocale
SetThreadLocale
SystemTimeToFileTime
GetVersionExW
GetSystemTime
InterlockedIncrement
InterlockedDecrement
LocalAlloc
GetBinaryTypeW
GetCommandLineW
MulDiv
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MapViewOfFile
LoadLibraryW
CreateFileMappingW
lstrlenA
UnmapViewOfFile
InterlockedCompareExchange
MoveFileExW
SetFileAttributesW
lstrlenW
ReadFile
GetFileSizeEx
DeleteFileW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetFileType
GetStdHandle
ExitProcess
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
DuplicateHandle
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
GetProcessAffinityMask
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetEnvironmentVariableW
GetPrivateProfileStringW
GetPrivateProfileIntW
FindResourceExW
FindResourceW
OutputDebugStringW
SetFilePointer
WriteFile
SizeofResource
LoadResource
GetCurrentThreadId
GetProcessHeap
HeapSize
HeapDestroy
LockResource
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetTimeFormatW
GetDateFormatW
SetThreadAffinityMask
LoadLibraryExW
GetProcAddress
GetModuleHandleW
FreeLibrary
VirtualFree
VirtualProtect
VirtualAlloc
GetSystemDirectoryW
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetThreadTimes
TerminateProcess
Sleep
CreateEventW
CreateMutexW
WaitForSingleObjectEx
WaitForSingleObject
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetACP
VerSetConditionMask
VerifyVersionInfoW
GetFileAttributesW
GetCurrentDirectoryW
ReleaseMutex
HeapWalk
HeapUnlock
HeapLock
CreateFileA
LocalFileTimeToFileTime
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
GetCPInfo
FormatMessageW
QueryPerformanceFrequency
QueryPerformanceCounter
TryEnterCriticalSection
GetStringTypeW
LoadLibraryExA
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
OpenProcess
SetFilePointerEx
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
DeviceIoControl
HeapFree
HeapReAlloc
HeapAlloc
SetErrorMode
SetLastError
GetLastError
RaiseException
CloseHandle
GetModuleHandleA
LocalFree
GlobalFree
CreateTimerQueueTimer
GlobalAlloc
CreateFileW
user32
GetSystemMetrics
IntersectRect
OffsetRect
DrawTextW
GetDesktopWindow
SetClipboardData
EmptyClipboard
GetSysColor
SetCursor
UnionRect
GetKeyState
ScreenToClient
SetWindowRgn
UpdateLayeredWindow
IsRectEmpty
GetUpdateRect
EndPaint
BeginPaint
InvalidateRect
ReleaseCapture
SetCapture
GetFocus
RegisterClassW
MonitorFromPoint
ReleaseDC
GetDC
EqualRect
PtInRect
GetMonitorInfoW
wsprintfW
SetWindowPos
IsWindowVisible
OpenClipboard
SetWindowLongW
GetClipboardData
IsClipboardFormatAvailable
CharLowerBuffW
CharNextW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
SendMessageW
CallWindowProcW
UnregisterClassW
GetClassInfoExW
SetTimer
KillTimer
LoadCursorW
GetMessagePos
GetAsyncKeyState
GetClientRect
GetWindowRect
GetParent
PostQuitMessage
MoveWindow
SetWindowTextW
LoadImageW
ClientToScreen
GetCursorPos
IsZoomed
SetFocus
EnableWindow
MapWindowPoints
GetWindow
GetWindowLongW
SendMessageTimeoutW
AttachThreadInput
IsWindow
ShowWindow
MonitorFromWindow
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostMessageW
GetWindowThreadProcessId
FindWindowW
SetForegroundWindow
GetForegroundWindow
CloseClipboard
SetActiveWindow
BringWindowToTop
IsIconic
DestroyWindow
comdlg32
GetOpenFileNameW
advapi32
RegOpenKeyW
CloseServiceHandle
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
EnumServicesStatusW
RegOpenCurrentUser
RegEnumKeyExW
RegSetValueW
RegQueryInfoKeyW
RegCreateKeyW
ConvertSidToStringSidW
LookupAccountNameW
OpenSCManagerW
GetTokenInformation
OpenProcessToken
RegSetValueExW
shell32
SHGetFolderPathW
SHChangeNotify
ExtractAssociatedIconW
DragQueryFileW
DragFinish
DragAcceptFiles
ord165
ShellExecuteW
CommandLineToArgvW
ord680
ole32
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
PropVariantClear
CreateStreamOnHGlobal
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
PathFindFileNameW
PathAppendW
PathIsRelativeW
PathFindExtensionW
SHSetValueW
SHDeleteValueW
PathCombineW
PathAddBackslashW
SHStrDupW
PathFileExistsW
StrCmpIW
SHGetValueW
SHDeleteKeyW
PathRemoveFileSpecW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
gdiplus
GdipCreateBitmapFromStream
GdipDisposeImage
GdipCloneImage
GdipFree
GdipGetPropertyItem
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipCreatePen1
GdipDeletePen
GdipDrawArc
GdipCreateLineBrushFromRect
GdipDeleteBrush
GdipCloneBrush
GdipGetPropertyItemSize
GdiplusStartup
GdiplusShutdown
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipGetImageWidth
GdipAlloc
GdipGetImageHeight
GdipSetLineBlend
GdipCreatePen2
GdipMeasureString
GdipFillEllipse
GdipDrawEllipse
GdipDrawString
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipSetStringFormatTrimming
GdipDeleteStringFormat
GdipStringFormatGetGenericTypographic
GdipCloneStringFormat
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawPath
GdipDrawRectangleI
GdipSetPenDashArray
GdipSetPenDashStyle
GdipDrawLineI
GdipCreateLineBrushFromRectI
GdipFillPath
GdipCreateSolidFill
GdipDrawImageRectRectI
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateMatrix
GdipClosePathFigure
ord1
GdipAddPathLine
GdipAddPathEllipse
GdipAddPathRectangle
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipGetWorldTransform
GdipFillRegion
GdipSetPathGradientFocusScales
GdipDeleteRegion
GdipCreateRegionPath
GdipSetPathGradientWrapMode
GdipSetPathGradientPresetBlend
GdipCreatePathGradientFromPath
GdipAddPathPath
GdipDeletePath
GdipCreatePath
GdipSetPixelOffsetMode
GdipCreateBitmapFromScan0
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipLoadImageFromFile
GdipImageRotateFlip
GdipDrawImageRect
GdipSetWorldTransform
GdipRotateMatrix
GdipTranslateMatrix
GdipImageSelectActiveFrame
GdipDeleteMatrix
comctl32
ord17
_TrackMouseEvent
InitCommonControlsEx
winmm
timeSetEvent
timeKillEvent
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
msimg32
AlphaBlend
crypt32
CryptQueryObject
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CryptMsgClose
CryptBinaryToStringA
CertGetNameStringW
CryptMsgGetParam
wininet
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
secur32
GetUserNameExW
gdi32
GetObjectW
GetStockObject
CreateFontIndirectW
DeleteObject
GetDeviceCaps
BitBlt
CreateRoundRectRgn
GetWindowOrgEx
CreateRectRgnIndirect
SaveDC
ExtSelectClipRgn
RestoreDC
CreateDIBSection
CreateCompatibleDC
SelectObject
DeleteDC
SetWindowOrgEx
SetStretchBltMode
StretchBlt
SetTextColor
SetBkColor
SetBkMode
GetObjectA
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ