F:\Project\Vega\SourceV3\VegaMonitor\Release\EPPCCMON.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050N.exe
Resource
win10v2004-20241007-en
General
-
Target
bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050N
-
Size
513KB
-
MD5
0c71a117279076fd1420d36e90139a20
-
SHA1
9364fe688f075a5b1f64a4e65aee07b7ef4aae0e
-
SHA256
bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050
-
SHA512
d5786b5682a3e98483d311e60590df25ee023682c131dd78ff6955dd4ce4f2cf805d35ef68468d2b2e61e96093050d676c5e53cde87dba2e03faca17e6b86388
-
SSDEEP
12288:PhDNC4OXslc5XKmFPU0/ZGKRKVKzKRis6urXFGu:PhDxOFKAPU0QKRKVKzKRnD0u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050N
Files
-
bc8db1cee74dbb17415c850a565b9c118a2bd51bf7679c349dc0aa66f6e05050N.exe windows:5 windows x86 arch:x86
1850b59326d6e137c4415d6d49d773be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFullPathNameW
CreateFileW
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
RaiseException
ExitThread
CreateThread
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualAlloc
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
WritePrivateProfileStringW
GetModuleHandleA
GlobalFlags
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalReAlloc
TlsGetValue
LocalAlloc
SetErrorMode
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrlenA
lstrcmpA
SuspendThread
SetEvent
SetThreadPriority
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetVersionExA
FreeResource
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FormatMessageW
LocalFree
MulDiv
SetLastError
GetExitCodeThread
GetCommandLineW
GetPrivateProfileIntW
CreateFileMappingW
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
GetUserDefaultLangID
InterlockedDecrement
WaitForMultipleObjects
CreateEventW
OutputDebugStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
ResumeThread
CloseHandle
ReleaseMutex
GetModuleFileNameW
GetFileAttributesW
GetExitCodeProcess
GetModuleHandleW
WaitForSingleObject
GlobalSize
GetCurrentProcess
CreateMutexW
GetPrivateProfileSectionNamesW
GlobalHandle
FindClose
GlobalFree
GetLastError
GlobalUnlock
lstrlenW
lstrcmpW
GetVersionExW
Sleep
GetSystemDirectoryW
GlobalAlloc
GlobalLock
FindFirstFileW
HeapSize
GetTempPathW
WideCharToMultiByte
GetTickCount
LockResource
GetProcAddress
MultiByteToWideChar
SizeofResource
LoadLibraryW
GetPrivateProfileStringW
GetProcessHeap
HeapFree
HeapAlloc
LoadResource
FreeLibrary
FindResourceW
GetEnvironmentStringsW
user32
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
ReleaseDC
GetSysColorBrush
GetWindowThreadProcessId
SetCursor
GetCursorPos
ValidateRect
ShowWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
CallWindowProcW
PtInRect
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColor
GetSystemMetrics
DestroyMenu
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
IsWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EndPaint
DestroyWindow
TranslateAcceleratorW
SetTimer
GetMessageW
PostQuitMessage
KillTimer
DialogBoxParamW
LoadCursorW
BeginPaint
LoadAcceleratorsW
RegisterClassExW
LoadIconW
EndDialog
LoadStringW
CreateWindowExW
DefWindowProcW
MessageBoxW
SendMessageW
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageW
DispatchMessageW
GetWindowRect
GetClientRect
GetDC
GetWindowLongW
SetWindowLongW
MapWindowPoints
GetPropW
GetWindow
MoveWindow
GetSystemMenu
EnableMenuItem
EnableWindow
gdi32
GetStockObject
Escape
TextOutW
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
DeleteDC
CreateDCW
SetLayout
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
GetObjectW
CreateBitmap
GetDeviceCaps
ExtEscape
SelectObject
winspool.drv
EnumPortsW
EnumPrintersW
SetJobW
GetPrinterW
OpenPrinterW
GetPrinterDriverW
EnumJobsW
ClosePrinter
GetJobW
DocumentPropertiesW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteExW
SHGetSpecialFolderPathW
shlwapi
PathFindExtensionW
PathFindFileNameW
wininet
HttpOpenRequestW
HttpQueryInfoW
InternetCloseHandle
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetQueryDataAvailable
InternetOpenW
InternetSetOptionW
rpcrt4
UuidCreate
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantChangeType
VarBstrCmp
VariantInit
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysStringLen
VariantClear
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE