Z:\Ventoy\Plugson\vs\VentoyPlugson\Release\VentoyPlugson.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d544d7637dbe8f7670c598ad1b8c9f97d40953bd4b074cc2e253d80ffc487691.exe
Resource
win7-20240903-en
General
-
Target
d544d7637dbe8f7670c598ad1b8c9f97d40953bd4b074cc2e253d80ffc487691
-
Size
440KB
-
MD5
dae047f9d3654546756ea003eb56458f
-
SHA1
578a19c7022030dcef11db06cbc70c42583271f6
-
SHA256
d544d7637dbe8f7670c598ad1b8c9f97d40953bd4b074cc2e253d80ffc487691
-
SHA512
93d3d72c842f0ffd81fcf254345f2a86ac80bcf6a38cf06de942690e1c59e641e9872b6514f4b7066229bf68b71728359e69d4a7a8fb7a2ec6627a94821bb679
-
SSDEEP
12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjC8NO0qwxeWfF6r2/S0lqJn:+el3+P0DvfOUYqcZQCGm4YprEH7e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d544d7637dbe8f7670c598ad1b8c9f97d40953bd4b074cc2e253d80ffc487691
Files
-
d544d7637dbe8f7670c598ad1b8c9f97d40953bd4b074cc2e253d80ffc487691.exe windows:6 windows x86 arch:x86
1df7cfa71495a8d5833182c6005b7af9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLogicalDrives
CreateMutexA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CloseHandle
ReadFile
GetFileInformationByHandleEx
WriteFile
DeviceIoControl
GetUserDefaultUILanguage
GetVolumeInformationA
CreateFileW
GetFileAttributesW
MultiByteToWideChar
CopyFileA
GetLastError
GetFileAttributesA
CreateFileA
SetEvent
CreateThread
SetFilePointerEx
GetFileSize
WideCharToMultiByte
CreateEventA
FlushFileBuffers
CreateDirectoryW
FindFirstFileW
SetHandleInformation
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
GetLongPathNameW
GetCurrentProcess
TerminateProcess
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
FindClose
GetCurrentThreadId
DuplicateHandle
GetVersion
Sleep
GetFileAttributesExW
GetCurrentThread
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
FreeLibrary
TlsGetValue
CreateProcessA
GetSystemTimeAsFileTime
TlsFree
QueryPerformanceCounter
MoveFileA
LoadLibraryExA
GetModuleFileNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetDllDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryA
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
DecodePointer
GetExitCodeProcess
HeapReAlloc
GetConsoleOutputCP
RemoveDirectoryW
GetFileSizeEx
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
HeapAlloc
HeapFree
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetStdHandle
GetFileType
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetConsoleMode
ReadConsoleW
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreatePipe
GetCommandLineA
GetCommandLineW
GetStdHandle
ExitProcess
user32
GetDlgItem
LoadIconA
SendMessageA
DialogBoxParamA
SetWindowTextW
EndDialog
MessageBoxW
EnableWindow
ws2_32
WSAStartup
getsockname
send
socket
ntohs
shutdown
htons
ioctlsocket
getnameinfo
setsockopt
listen
ntohl
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
recv
htonl
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ