C:\vmagent_new\bin\joblist\825703\out\Release\SysCleanPro.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515.exe
Resource
win10v2004-20240802-en
General
-
Target
a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515
-
Size
1.3MB
-
MD5
0ce41f1385ecbe9b4b0d5661c98e3e48
-
SHA1
78011d01907cc947e88ae94ba512900e6ce08e17
-
SHA256
a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515
-
SHA512
6cd763da1176db8c54198ae9f52ba1303236776f7839a3ff9564fcae03f83aa05a309fdd2883da54f356fb0e77fc71b87fddf90e0396bd266c1e1a08ba6f3607
-
SSDEEP
24576:tOdZfkO6+EFFKBqM8C9uU0N4ryz4EAX6pipxXZ:twEoUZ5N4rREAX64pxXZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515
Files
-
a4c4884eb9c8ee2800100a071f4992dc951d8547779d77c006962adeba5e3515.exe windows:6 windows x86 arch:x86
1286a3f92a52f9c6791d3c58e7ae204b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetUserDefaultLCID
SizeofResource
HeapSize
LockResource
FindResourceExW
LoadResource
FindResourceW
HeapDestroy
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
GetTempPathW
GetCurrentThreadId
WritePrivateProfileStringW
GetLogicalDriveStringsW
GetDriveTypeW
QueryDosDeviceW
InitializeCriticalSection
FreeResource
DeleteFileW
CopyFileW
WriteFile
SetFilePointer
GetLocalTime
MoveFileW
GetCurrentProcess
GetVersionExW
GetSystemWindowsDirectoryW
SetNamedPipeHandleState
GetCommandLineW
GetPrivateProfileStringW
WaitNamedPipeW
ReadFile
GetPrivateProfileIntW
SetEndOfFile
GetFileSize
GetTempFileNameW
WaitForMultipleObjects
GetVolumeInformationW
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
GetSystemPowerStatus
FindFirstFileW
FindNextFileW
FindClose
MoveFileExW
lstrlenW
SetFileAttributesW
VerSetConditionMask
VerifyVersionInfoW
GetACP
FormatMessageW
GetFileSizeEx
GetLongPathNameW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
FileTimeToSystemTime
Process32FirstW
GetWindowsDirectoryW
CreateProcessW
SystemTimeToTzSpecificLocalTime
lstrcmpiW
SetCurrentDirectoryW
IsBadReadPtr
GetLocaleInfoW
GetComputerNameW
SetThreadPriority
GetCurrentThread
RemoveDirectoryW
GetSystemDefaultLangID
GetFileAttributesExW
SetFileTime
SystemTimeToFileTime
GetFileType
DosDateTimeToFileTime
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
CreateMutexW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
EnumSystemLocalesW
IsValidLocale
GetTimeZoneInformation
GetStdHandle
GetCommandLineA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
lstrcmpiA
lstrcmpA
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReleaseMutex
OpenThread
HeapWalk
HeapUnlock
HeapLock
SetFilePointerEx
CreateFileA
LocalFileTimeToFileTime
GetCPInfo
GetStringTypeW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
LocalFree
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
CompareStringW
LoadLibraryW
GetProcAddress
GetModuleFileNameW
WaitForSingleObjectEx
WaitForSingleObject
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeviceIoControl
FreeLibrary
VirtualFree
VirtualAlloc
GetSystemDirectoryW
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
Sleep
GetThreadPriority
CreateEventW
HeapFree
HeapReAlloc
HeapAlloc
SetErrorMode
SetLastError
GetLastError
RaiseException
CloseHandle
AreFileApisANSI
CreateFileW
GetFullPathNameW
GetFileAttributesW
user32
LoadCursorW
RegisterClassExW
CreateWindowExW
PostQuitMessage
ClientToScreen
ScreenToClient
GetCursorPos
SetRect
GetWindowTextW
DrawIconEx
SetRectEmpty
PtInRect
UnregisterClassW
DialogBoxParamW
SetWindowLongW
GetActiveWindow
MoveWindow
ShowWindow
SetWindowPos
SwitchToThisWindow
PeekMessageW
GetWindowRect
DispatchMessageW
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetParent
GetClientRect
MapWindowPoints
GetMonitorInfoW
EndDialog
MonitorFromWindow
GetWindow
IsWindow
CreateDialogParamW
PostMessageW
CharLowerBuffW
MessageBoxW
GetClassInfoExW
SetForegroundWindow
wsprintfW
GetClassNameW
FindWindowW
SetFocus
EnumWindows
GetForegroundWindow
ExitWindowsEx
WaitForInputIdle
SendMessageW
EnumChildWindows
SetActiveWindow
GetWindowThreadProcessId
KillTimer
SetTimer
LoadImageW
DestroyIcon
AttachThreadInput
CharNextW
LockSetForegroundWindow
GetMessageW
BringWindowToTop
TranslateMessage
PrivateExtractIconsW
GetIconInfo
CopyRect
IsIconic
DestroyWindow
IsWindowVisible
GetSystemMetrics
SetWindowTextW
gdi32
GetObjectW
DeleteObject
advapi32
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
RegCreateKeyW
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
GetFileSecurityW
SetFileSecurityW
RegEnumKeyExA
RegSetValueExW
shell32
ord155
ExtractIconW
ord190
SHGetSpecialFolderLocation
SHGetFileInfoW
SHOpenFolderAndSelectItems
ShellExecuteW
SHGetSpecialFolderPathW
ord165
ShellExecuteExW
SHGetMalloc
ole32
CoUninitialize
CoCreateInstance
OleRun
CoInitializeEx
CoSetProxyBlanket
CLSIDFromString
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysStringByteLen
SysFreeString
SysAllocStringByteLen
SysAllocString
VariantClear
VariantInit
VariantTimeToSystemTime
SysAllocStringLen
VarUI4FromStr
SafeArrayCreate
SystemTimeToVariantTime
SafeArrayLock
VariantCopy
SafeArrayGetVartype
SafeArrayCopy
SafeArrayGetLBound
SafeArrayUnlock
SafeArrayGetUBound
SafeArrayDestroy
DispCallFunc
shlwapi
SHSetValueW
SHGetValueW
PathFindFileNameW
PathAddBackslashW
SHDeleteValueW
PathFindExtensionW
StrCmpNIW
StrRStrIW
PathIsDirectoryEmptyW
PathCombineW
PathRemoveFileSpecW
StrStrIW
PathStripToRootW
PathFileExistsW
PathAppendW
PathIsDirectoryW
StrStrW
SHGetValueA
SHSetValueA
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
setupapi
SetupIterateCabinetW
comctl32
InitCommonControlsEx
gdiplus
GdipDrawImageRect
GdipGetImagePixelFormat
GdipBitmapLockBits
GdipBitmapGetPixel
GdipCreateBitmapFromHICON
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipDrawImageRectRect
GdipDeleteBrush
GdipDeletePath
GdipSetSmoothingMode
GdipCreatePath
GdipCreateSolidFill
GdipFillPath
GdipAddPathArc
GdipDeleteGraphics
GdipGetImageWidth
GdipGetImageThumbnail
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipFree
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipCreateFromHDC
imm32
ImmDisableIME
powrprof
CallNtPowerInformation
urlmon
URLDownloadToCacheFileW
Sections
.text Size: 983KB - Virtual size: 982KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ