c:\tmp\tmp_build\yoctoprod\tools\VirtualHub\windows\obj\amd64VirtualHub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b.exe
Resource
win10v2004-20240802-en
General
-
Target
e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b
-
Size
1.2MB
-
MD5
f34b447442640640fa5e18f08e238290
-
SHA1
1644ab767d781614adbada6bece4810a2c84081f
-
SHA256
e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b
-
SHA512
c5430c8cfbfebc02e099d170c24c735a784c5cf49949446b4f00c6e0ddd7e49a7619ea5dc8d60f016a67741f441b6e9da5a1dd02c2c06e351a6c53a9e290dda2
-
SSDEEP
24576:okLazwwqeBi0xlaytf3lHZUvNeoThCQeXovsxsmFAsOgLtInve90Ixsouou:4w2Xa23lavNe0g5XJ1FAsOu1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b
Files
-
e29bd8dd7db50365088bd1049d04b9e9aee53b25615206be1dcc2a8f35d2e73b.exe windows:6 windows x64 arch:x64
80942f5cd9779d167b1d5fcf41264de5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
SetEvent
TerminateThread
TryEnterCriticalSection
CreateThread
ResetEvent
DeleteCriticalSection
TlsGetValue
GetCurrentProcess
GetComputerNameA
SetConsoleCtrlHandler
SetEndOfFile
CreateEventA
FormatMessageA
CreateMailslotA
GetProcAddress
GetOverlappedResult
CloseHandle
LoadLibraryA
CreateFileA
GetLastError
WaitForMultipleObjects
WriteFile
CancelIo
ReadFile
GetSystemTime
SystemTimeToFileTime
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
TlsAlloc
GetModuleFileNameA
WriteConsoleW
HeapReAlloc
HeapSize
CreateFileW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetCurrentDirectoryW
ReadConsoleW
MultiByteToWideChar
GetTimeZoneInformation
WideCharToMultiByte
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetFileType
HeapAlloc
HeapFree
LCMapStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
InitializeCriticalSectionAndSpinCount
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetDriveTypeW
GetFullPathNameW
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
advapi32
DeregisterEventSource
CreateServiceA
RegCloseKey
StartServiceCtrlDispatcherA
CloseServiceHandle
RegQueryValueExA
SetServiceStatus
OpenSCManagerA
RegisterServiceCtrlHandlerExA
DeleteService
ControlService
StartServiceA
ReportEventA
RegOpenKeyExA
ChangeServiceConfig2A
OpenServiceA
RegisterEventSourceA
AdjustTokenPrivileges
LookupPrivilegeValueA
InitiateSystemShutdownA
OpenProcessToken
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
ws2_32
WSACleanup
__WSAFDIsSet
WSAIoctl
closesocket
select
getaddrinfo
WSAStartup
inet_addr
getsockname
send
recvfrom
bind
WSASocketA
recv
getsockopt
htons
freeaddrinfo
sendto
ioctlsocket
setsockopt
WSAGetLastError
ntohl
htonl
ntohs
getpeername
gethostname
listen
accept
socket
connect
Sections
.text Size: 441KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 665KB - Virtual size: 664KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ