C:\vmagent_new\bin\joblist\804071\out\Release\SetupX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385.exe
Resource
win10v2004-20240802-en
General
-
Target
19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385
-
Size
14.1MB
-
MD5
8832acc617f4de88a85f56d8cc232cda
-
SHA1
60a4efdb6a935ccd1ec80b4d4cfb1fee9659484d
-
SHA256
19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385
-
SHA512
591014c02778c2316f7852f6d340607e3633ca7d3374122f2383cee8e6543410049e057fe370cb165b4050c661b73a2f8aec7546ca4cdfb0960ed4da90435444
-
SSDEEP
196608:YRj2fX++YW+JW2h5IYZ+w18V2Gz7LPNX3FR9j9u+GiIXUOQSMmHUIL:qjIzYlh/+o8V2GvLPNXV/Q+CQSM8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385
Files
-
19c22d7793c7c6280734a0c5222dd2c94a0f530782c6c8f65a64fce3e9e94385.exe windows:5 windows x86 arch:x86
3008ba2d73a6802b5057dc195b74283d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
WaitForSingleObject
GetDiskFreeSpaceExW
lstrlenW
GetCommandLineW
CreateProcessW
CreateEventW
DuplicateHandle
OpenProcess
TerminateProcess
MoveFileExW
GetTickCount
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetEvent
WriteFile
lstrcmpiW
RaiseException
InterlockedIncrement
SetErrorMode
GetWindowsDirectoryW
FlushInstructionCache
SetCurrentDirectoryW
GetSystemDirectoryW
WaitForMultipleObjects
ResetEvent
GetFileType
SystemTimeToFileTime
DosDateTimeToFileTime
SetFileTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersionExW
GetTempPathW
GetStringTypeW
GetStringTypeA
LCMapStringA
SetStdHandle
WriteConsoleW
GetSystemWindowsDirectoryW
WriteConsoleA
GetLocaleInfoA
GetModuleHandleA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
LCMapStringW
GetStartupInfoA
SetHandleCount
IsValidCodePage
InterlockedCompareExchange
GetCPInfo
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
RtlUnwind
GetStartupInfoW
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
SetLastError
DeleteFileW
CreateDirectoryW
GetCurrentThreadId
GetCurrentProcess
LoadLibraryExW
FreeResource
LoadLibraryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetACP
FormatMessageW
WideCharToMultiByte
GetLastError
CreateMutexW
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleW
DeviceIoControl
GetCurrentProcessId
CreateFileW
SetFilePointer
ReadFile
CloseHandle
GetProcAddress
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetOEMCP
Sleep
FreeLibrary
GetConsoleOutputCP
user32
IsIconic
FindWindowW
MessageBoxW
UnregisterClassA
GetActiveWindow
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
CharNextW
CallWindowProcW
DestroyWindow
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
RegisterWindowMessageW
PostThreadMessageW
PostQuitMessage
PostMessageW
DisableProcessWindowsGhosting
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowLongW
SetWindowPos
SetWindowTextW
SendMessageW
GetSystemMetrics
LoadImageW
GetParent
IsWindowVisible
GetWindow
GetWindowLongW
GetWindowRect
LoadStringW
DefWindowProcW
advapi32
SetTokenInformation
SaferCreateLevel
QueryServiceStatusEx
OpenServiceW
ControlService
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
CreateServiceW
OpenSCManagerW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SaferCloseLevel
CreateProcessAsUserW
FreeSid
GetLengthSid
AllocateAndInitializeSid
SaferComputeTokenFromLevel
RegQueryValueExA
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
DispCallFunc
VarUI4FromStr
shlwapi
PathCombineW
SHGetValueW
PathFileExistsW
StrCmpNIW
StrStrIW
PathFindExtensionW
StrCmpIW
PathRemoveBackslashW
PathIsRootW
PathAppendW
PathStripToRootW
PathRemoveFileSpecW
PathFindFileNameW
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13.7MB - Virtual size: 13.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ