Z:\Ventoy\Plugson\vs\VentoyPlugson\Release\VentoyPlugson.pdb
Static task
static1
Behavioral task
behavioral1
Sample
390617264f37576254ed17b13940b820N.exe
Resource
win7-20240903-en
General
-
Target
390617264f37576254ed17b13940b820N.exe
-
Size
440KB
-
MD5
390617264f37576254ed17b13940b820
-
SHA1
20e349c9aa1a6150cc2294bd8514beb5c549a042
-
SHA256
191923e72b3917acd931f7424571be4f6b41b904583df29e0fe0c7d5eaf739b9
-
SHA512
d22e41b5a8a05794559f2fd1938e2d5019c73936f3782b917b35ddfe08bee7edbe01b67de0327bf8eef65261bd8efcdab71e2c20e170d3ba73c85d584ef8c57d
-
SSDEEP
12288:2/JNDjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjj8NO0qwxeWfF02/S0lqJqcZQCZ:+d3+m0DvfeUYqcZQCGm4YprEH7gL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 390617264f37576254ed17b13940b820N.exe
Files
-
390617264f37576254ed17b13940b820N.exe.exe windows:6 windows x86 arch:x86
1df7cfa71495a8d5833182c6005b7af9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLogicalDrives
CreateMutexA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CloseHandle
ReadFile
GetFileInformationByHandleEx
WriteFile
DeviceIoControl
GetUserDefaultUILanguage
GetVolumeInformationA
CreateFileW
GetFileAttributesW
MultiByteToWideChar
CopyFileA
GetLastError
GetFileAttributesA
CreateFileA
SetEvent
CreateThread
SetFilePointerEx
GetFileSize
WideCharToMultiByte
CreateEventA
FlushFileBuffers
CreateDirectoryW
FindFirstFileW
SetHandleInformation
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
GetLongPathNameW
GetCurrentProcess
TerminateProcess
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
FindClose
GetCurrentThreadId
DuplicateHandle
GetVersion
Sleep
GetFileAttributesExW
GetCurrentThread
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
FreeLibrary
TlsGetValue
CreateProcessA
GetSystemTimeAsFileTime
TlsFree
QueryPerformanceCounter
MoveFileA
LoadLibraryExA
GetModuleFileNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetDllDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryA
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
DecodePointer
GetExitCodeProcess
HeapReAlloc
GetConsoleOutputCP
RemoveDirectoryW
GetFileSizeEx
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
HeapAlloc
HeapFree
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetStdHandle
GetFileType
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetConsoleMode
ReadConsoleW
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreatePipe
GetCommandLineA
GetCommandLineW
GetStdHandle
ExitProcess
user32
GetDlgItem
LoadIconA
SendMessageA
DialogBoxParamA
SetWindowTextW
EndDialog
MessageBoxW
EnableWindow
ws2_32
WSAStartup
getsockname
send
socket
ntohs
shutdown
htons
ioctlsocket
getnameinfo
setsockopt
listen
ntohl
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
recv
htonl
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ