C:\vmagent_new\bin\joblist\545749\out\Release\360ZipSandbox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
601f77d504c087d98216a9e2358dff20N.exe
Resource
win7-20240705-en
General
-
Target
601f77d504c087d98216a9e2358dff20N.exe
-
Size
588KB
-
MD5
601f77d504c087d98216a9e2358dff20
-
SHA1
46755364f1f37e8fa6ce9ab07e3f4263bd54bdf6
-
SHA256
c4e0aa49f5b0e1e3a163f852bc37b01135d07cb4cb6e2e6626c404be65e7f5fb
-
SHA512
4bfc9a4f7ac1f8236f021c54dea52058569a3bf31ae701873883c3b4e84b65075b241b718616ee84eeef74b2ea43c748f84d5cc97a0121a477471ad2dc56596b
-
SSDEEP
12288:hMYts2jbSPPTMBb/7h636HcB3Xf3SUiw5rW867JtYZj9yh+:SYvpHcBHqe5rWP7JtYZj9yh+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 601f77d504c087d98216a9e2358dff20N.exe
Files
-
601f77d504c087d98216a9e2358dff20N.exe.exe windows:5 windows x86 arch:x86
4156d16573afebc11e64fd1f1077d1ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualQuery
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SetThreadPriority
GetThreadPriority
GetThreadContext
SuspendThread
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
CloseHandle
GetSystemInfo
GetModuleHandleW
DecodePointer
RaiseException
VirtualProtect
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FindClose
GetModuleFileNameW
GetSystemDirectoryW
CreateFileW
FindFirstFileW
FindNextFileW
GetFileSizeEx
ReadFile
SetFilePointer
WideCharToMultiByte
FreeLibrary
SetUnhandledExceptionFilter
DeviceIoControl
LoadLibraryW
LoadLibraryExW
GetEnvironmentVariableW
GetVersionExW
VirtualAlloc
FlushInstructionCache
GetProcAddress
GetLastError
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
IsProcessorFeaturePresent
UnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
WriteFile
SetFilePointerEx
LocalFileTimeToFileTime
CreateFileA
SystemTimeToFileTime
SetLastError
TlsSetValue
HeapFree
HeapLock
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapWalk
TlsAlloc
HeapAlloc
GetProcessHeap
TlsGetValue
TlsFree
HeapUnlock
RtlUnwind
EncodePointer
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
ExitProcess
MultiByteToWideChar
GetACP
WaitForSingleObjectEx
CreateThread
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetStringTypeW
GetCurrentThread
user32
GetMessageW
GetInputState
PostThreadMessageW
shlwapi
PathRemoveFileSpecW
StrStrIA
StrStrIW
PathMatchSpecW
PathCombineW
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
Exports
Exports
_lock@8
_unlock@8
Sections
.text Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 155KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE