Z:\Ventoy\Plugson\vs\VentoyPlugson\Release\VentoyPlugson.pdb
Static task
static1
Behavioral task
behavioral1
Sample
37235127b9ecf08fdc0ee92a46b11c5c162f33da49956885eecd79fc8ddfec7b.exe
Resource
win11-20240802-en
General
-
Target
37235127b9ecf08fdc0ee92a46b11c5c162f33da49956885eecd79fc8ddfec7b
-
Size
433KB
-
MD5
258d65f27147907614ea87e0e43378c5
-
SHA1
e74d3d0ef8d3d94dcdc155f270184abc7b1fb30b
-
SHA256
37235127b9ecf08fdc0ee92a46b11c5c162f33da49956885eecd79fc8ddfec7b
-
SHA512
2ade9c22efdf990a6bb05bcc07aa515e083deff7a670a640e09e36813614ce54949cd37d5f03c13b41aa8aeabde0a06e7b8d803f0fd4948070d11668483a2736
-
SSDEEP
12288:R/wlw5kfMQrHlzXzA8ZZeOeuRgvLOBsn/jgQEosxKq8kDfyVbKZ1qq2A/5Cd3jm9:+5O0gPgLx/1fpz2A/5Cd3jmjrEH7Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37235127b9ecf08fdc0ee92a46b11c5c162f33da49956885eecd79fc8ddfec7b
Files
-
37235127b9ecf08fdc0ee92a46b11c5c162f33da49956885eecd79fc8ddfec7b.exe windows:6 windows x86 arch:x86
d7214d339deab0b16a7e28bdb9d3db42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLogicalDrives
CreateMutexA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CloseHandle
ReadFile
GetFileInformationByHandleEx
WriteFile
DeviceIoControl
GetUserDefaultUILanguage
GetVolumeInformationA
CreateFileW
GetFileAttributesW
MultiByteToWideChar
CopyFileA
GetLastError
GetFileAttributesA
CreateFileA
SetEvent
CreateThread
SetFilePointerEx
GetFileSize
WideCharToMultiByte
CreateEventA
FlushFileBuffers
CreateDirectoryW
FindFirstFileW
SetHandleInformation
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
GetLongPathNameW
GetCurrentProcess
TerminateProcess
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
FindClose
GetCurrentThreadId
DuplicateHandle
GetVersion
Sleep
GetFileAttributesExW
GetCurrentThread
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
FreeLibrary
TlsGetValue
CreateProcessA
GetSystemTimeAsFileTime
TlsFree
QueryPerformanceCounter
MoveFileA
LoadLibraryExA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetDllDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
DecodePointer
GetExitCodeProcess
HeapReAlloc
GetConsoleOutputCP
RemoveDirectoryW
GetFileSizeEx
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetStdHandle
GetFileType
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetConsoleMode
ReadConsoleW
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreatePipe
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
GetTimeZoneInformation
user32
GetDlgItem
LoadIconA
SendMessageA
DialogBoxParamA
SetWindowTextW
EndDialog
MessageBoxW
EnableWindow
ws2_32
WSAStartup
getsockname
send
ntohs
shutdown
socket
htons
ioctlsocket
getnameinfo
setsockopt
listen
ntohl
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
recv
htonl
Sections
.text Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ