c:\jenkins\workspace\8-2-build-windows-amd64-cygwin\jdk8u281\880\build\windows-amd64\deploy\tmp\ssvagent\obj64\ssvagent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aa7d7a0699959d96acd6a15f5638197486c14663ae93816ef3c0fbdfd23031aa.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa7d7a0699959d96acd6a15f5638197486c14663ae93816ef3c0fbdfd23031aa.exe
Resource
win10v2004-20240802-en
General
-
Target
79c7565723396795962840fb327933b1.zip
-
Size
290KB
-
MD5
fb782cf8c9eb7897ac7e8b9e33b62487
-
SHA1
ef5595a7c3badb2da1f65ae74c5ba4af42a2520b
-
SHA256
9544e8e7eef13cfe1dd3fc980a7331b490ffabd81c4ef511b93e013e78fcaee1
-
SHA512
b8e85287373c8318f8ba019672c798f7011d5027949ec194e4f24d0d04ece755a50ca8c909de34e47dcb87ebda7f9e1d7d5bdf6b39b7a35f923ae0f343e7ae14
-
SSDEEP
6144:0o7aPYwgAy9OmIbHmCxPbH7t2ZPzjuxF6d8Gdm7XEj89MX:NmQwgAyjIGC1H7IPXuj6d8ijp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/aa7d7a0699959d96acd6a15f5638197486c14663ae93816ef3c0fbdfd23031aa
Files
-
79c7565723396795962840fb327933b1.zip.zip
Password: infected
-
aa7d7a0699959d96acd6a15f5638197486c14663ae93816ef3c0fbdfd23031aa.exe windows:6 windows x64 arch:x64
Password: infected
04dad0d9160a29c2376e115698d32c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcmpiW
MultiByteToWideChar
VerSetConditionMask
GetEnvironmentVariableW
CreateFileW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
CloseHandle
WaitForSingleObject
GetCurrentProcess
CreateProcessW
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
RtlCaptureContext
user32
GetWindowThreadProcessId
GetShellWindow
CharNextW
wsprintfW
OpenInputDesktop
CloseDesktop
ole32
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
oleaut32
SysAllocStringByteLen
VarUI4FromStr
SysAllocString
SysStringLen
VariantClear
SysFreeString
vcruntime140
__C_specific_handler
__std_exception_copy
__std_exception_destroy
wcsstr
memcpy
__CxxFrameHandler3
memset
_CxxThrowException
api-ms-win-crt-runtime-l1-1-0
_cexit
_seh_filter_exe
_set_app_type
_configure_wide_argv
_get_wide_winmain_command_line
_initterm
_initterm_e
_crt_atexit
_exit
_invalid_parameter_noinfo
_c_exit
_register_thread_local_exe_atexit_callback
_errno
__p___argc
__p___wargv
_register_onexit_function
terminate
_initialize_wide_environment
exit
_initialize_onexit_table
api-ms-win-crt-string-l1-1-0
wcscat_s
wcscmp
_wcsicmp
wcscpy_s
wcsncpy_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
_recalloc
_set_new_mode
free
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-filesystem-l1-1-0
_wsplitpath_s
_wstat64i32
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
_wputenv
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
_wfopen_s
__stdio_common_vsnwprintf_s
fclose
__stdio_common_vswprintf_s
__stdio_common_vfwprintf_s
api-ms-win-crt-time-l1-1-0
wcsftime
_localtime64
_ftime64_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ