C:\Users\123\source\repos\vvware_v3\x64\Release\vvware_v3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
vvware_v3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
vvware_v3.exe
Resource
win10v2004-20240802-en
General
-
Target
vvware_v3.exe
-
Size
2.6MB
-
MD5
f277e1eea63502240b9c2183248fdfca
-
SHA1
186292a40804279fc7f8dd9ae79be66a87042ecc
-
SHA256
27abe6f4dc371d7e7008dc5c4b079d85f6e2c5b583b2fd831674186e92d583fd
-
SHA512
6b6f7816fed6fbabd211eb7fa61c7f438b58917f2a5748265858db8fd7b4b39cfd8b0297a85f5323dda3c50df0c82fbb0b1f1015c64092af257a7391fb8823d5
-
SSDEEP
49152:kwgIVz/f/pxyOF+wTSZ1ItH7oTcCYnENFvBZe2tYLv:jHp+wuYsfUv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource vvware_v3.exe
Files
-
vvware_v3.exe.exe windows:6 windows x64 arch:x64
89d9bdf7d3c852bcb78b6fe261098187
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
GetCurrentHwProfileA
RegCloseKey
RegOpenKeyW
RegCreateKeyW
RegDeleteTreeW
RegSetKeyValueW
CryptReleaseContext
CryptGetHashParam
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptAcquireContextA
CryptEncrypt
ole32
CoTaskMemFree
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
d3d11
D3D11CreateDeviceAndSwapChain
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
D3DX11CreateShaderResourceViewFromFileW
ntdll
RtlInitUnicodeString
RtlUnwindEx
NtQuerySystemInformation
VerSetConditionMask
RtlPcToFileHeader
RtlUnwind
user32
ScreenToClient
GetKeyState
LoadCursorA
ClientToScreen
GetKeyboardLayout
SetCursor
UpdateWindow
FindWindowA
GetClipboardData
GetForegroundWindow
MessageBoxA
MapVirtualKeyA
CloseClipboard
GetCursorInfo
OpenClipboard
GetAsyncKeyState
GetKeyNameTextA
ShowWindow
GetSystemMetrics
SetWindowPos
SendMessageTimeoutA
SetClipboardData
EmptyClipboard
GetCursorPos
SetCursorPos
GetClientRect
kernel32
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
DeleteFileW
WriteConsoleW
GetModuleFileNameW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
Process32First
DeviceIoControl
SetThreadPriority
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetLastError
CreateFileA
Process32Next
CloseHandle
Beep
GlobalLock
GetConsoleWindow
GlobalUnlock
IsDebuggerPresent
GlobalAlloc
GlobalFree
WideCharToMultiByte
GetModuleHandleA
GetLocaleInfoA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
VirtualFree
VirtualAlloc
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
SetUnhandledExceptionFilter
GetTempPathW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
GetSystemDirectoryA
VerifyVersionInfoA
GetTickCount
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SetLastError
FlsAlloc
GetFileSizeEx
FileTimeToSystemTime
GetLocaleInfoEx
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetFileInformationByHandle
AreFileApisANSI
GetModuleHandleW
GetFileInformationByHandleEx
SwitchToThread
GetExitCodeThread
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetStringTypeW
WakeAllConditionVariable
SleepConditionVariableSRW
LCMapStringEx
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
TlsGetValue
SetFilePointerEx
WriteFile
GetCommandLineA
GetConsoleMode
GetCommandLineW
ReadConsoleW
GetConsoleOutputCP
HeapAlloc
FlushFileBuffers
LocalFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
RaiseException
HeapFree
EnumSystemLocalesW
HeapReAlloc
OutputDebugStringW
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetEndOfFile
HeapSize
FormatMessageA
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetContext
d3dcompiler_43
D3DCompile
wldap32
ord211
ord60
ord45
ord50
ord41
ord22
ord46
ord26
ord143
ord27
ord32
ord33
ord35
ord79
ord301
ord30
ord200
ord217
crypt32
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertFindExtension
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertGetNameStringA
CertAddCertificateContextToStore
CertOpenStore
ws2_32
WSASetLastError
closesocket
recv
send
ntohl
gethostname
sendto
recvfrom
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSAGetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
normaliz
IdnToAscii
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 369KB - Virtual size: 369KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 736KB - Virtual size: 746KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ