C:\vmagent_new\bin\joblist\806392\out\Release\Installer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f.exe
Resource
win10v2004-20240802-en
General
-
Target
e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f
-
Size
5.9MB
-
MD5
e8d445b08b6eb253b2ca3fa54a926ba6
-
SHA1
4e6b9ef2a9b0296b3c88874fd7f8f9969674f7a4
-
SHA256
e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f
-
SHA512
a96e97e6dccb77b3c9b28a8e0761b8d87951bd250179f8449bf74a283b46d0448c9877425915194d437c24338100092b9b18618d4c14c0fe06e5ea2c709170c9
-
SSDEEP
98304:1r/MrEH0PGk/q9ajJDm7/Mhudd7LCiBU8TsoflvCCAF/MqYvGNE+4KGnsYbePzJ:1rBym7jGiB3TsohCC4/aq3GsYk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f
Files
-
e3654d525c164e6e081ea28a887336cfa4becf81d6547e6264d425816a27013f.exe windows:5 windows x86 arch:x86
32c682ea84e47b03394cb7450a426819
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetLastError
CloseHandle
WaitForSingleObject
SetEvent
ResumeThread
lstrlenW
FindClose
FindNextFileW
FindFirstFileW
TerminateThread
MultiByteToWideChar
MoveFileExW
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesW
DeleteFileW
DeviceIoControl
CreateFileW
GetDriveTypeW
GetProcAddress
GetModuleHandleW
GetSystemDirectoryW
GetVersionExW
FreeLibrary
LoadLibraryA
ProcessIdToSessionId
Sleep
GlobalMemoryStatus
GlobalMemoryStatusEx
GetCurrentProcess
InterlockedExchange
FreeResource
LoadLibraryExW
LoadLibraryW
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileSize
GetDiskFreeSpaceExW
GetSystemWindowsDirectoryW
OpenMutexW
ReleaseMutex
CreateMutexW
GetCurrentProcessId
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
GetSystemInfo
GetModuleHandleA
GetModuleHandleExW
WideCharToMultiByte
ResetEvent
SetLastError
GetCurrentThreadId
InterlockedCompareExchange
QueryDosDeviceW
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
GetExitCodeProcess
OpenProcess
InterlockedDecrement
TerminateProcess
GetVersion
WritePrivateProfileStringW
HeapFree
HeapAlloc
GetProcessHeap
lstrcmpiW
GetTickCount
WaitForMultipleObjects
CreateEventW
GetModuleFileNameW
GetPrivateProfileStringW
GetWindowsDirectoryW
CreateProcessW
SetFileTime
SystemTimeToFileTime
GetSystemTime
GetUserDefaultUILanguage
GetOverlappedResult
CreateThread
InterlockedIncrement
GetSystemTimeAsFileTime
CreateRemoteThread
CopyFileW
lstrcmpiA
lstrlenA
MoveFileW
CreateDirectoryW
RaiseException
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeConsole
ReleaseSemaphore
GetTempPathW
GetTimeZoneInformation
GetCommandLineW
GetTempFileNameW
OpenEventW
GetFullPathNameW
CreateFileA
GetStartupInfoW
FlushInstructionCache
GlobalReAlloc
GetLocaleInfoW
lstrcmpW
GetACP
ExitProcess
GetModuleFileNameA
GlobalFindAtomW
SetErrorMode
GetEnvironmentVariableW
GetStdHandle
SetWaitableTimer
OpenEventA
GetShortPathNameW
HeapDestroy
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
LocalFileTimeToFileTime
SetFilePointerEx
GetFileSizeEx
TlsGetValue
OutputDebugStringW
TlsSetValue
HeapUnlock
OpenThread
HeapLock
HeapWalk
TlsAlloc
TlsFree
CreateEventA
GetVolumeInformationW
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
ExitThread
LCMapStringA
LCMapStringW
GetStringTypeW
HeapCreate
GetOEMCP
IsValidCodePage
GetStringTypeA
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcmpA
PeekNamedPipe
SetNamedPipeHandleState
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CancelIo
CreateSemaphoreA
DuplicateHandle
CreateWaitableTimerA
imm32
ImmDisableIME
Sections
.text Size: 954KB - Virtual size: 954KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98.1MB - Virtual size: 98.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ