C:\vmagent_new\bin\joblist\840495\out\Release\Uninstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
afa353430256424bc8c6a84754de1b4c1b1d57e8b691c4f15a872d39e1b6a80a.exe
Resource
win7-20240729-en
General
-
Target
afa353430256424bc8c6a84754de1b4c1b1d57e8b691c4f15a872d39e1b6a80a
-
Size
689KB
-
MD5
dbb306ab5cf004b35ec60f252461361f
-
SHA1
3fb12d024e72c30176a4d50ba934b2c122aa5ca9
-
SHA256
afa353430256424bc8c6a84754de1b4c1b1d57e8b691c4f15a872d39e1b6a80a
-
SHA512
36ab6ed9f1d140ebf48371588075fa5b496b5dc0ace44ad1a23a1218c119b3bc7c611a75652bc8f47bd0aa9d69041131878974f2ce377a6aba45dda2be78f527
-
SSDEEP
12288:Sa0xH2Ts7iZ2kqU/8l/3KBoPvnTFt42vfazBd8X:n0d6Qkl853K0vRlvC7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afa353430256424bc8c6a84754de1b4c1b1d57e8b691c4f15a872d39e1b6a80a
Files
-
afa353430256424bc8c6a84754de1b4c1b1d57e8b691c4f15a872d39e1b6a80a.exe windows:5 windows x86 arch:x86
430fea70b2c6a2e714eae04510c8fe19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTempFileNameW
LoadLibraryW
CreateEventW
SetEvent
WaitForMultipleObjects
OpenProcess
TerminateProcess
GlobalAlloc
GlobalFree
GetCurrentThread
GetThreadContext
VirtualQuery
SetThreadPriority
VirtualAlloc
OpenThread
GetSystemInfo
GetThreadPriority
VirtualProtect
SuspendThread
ResumeThread
WideCharToMultiByte
SetFilePointer
GetTickCount
ReadFile
GetFileSizeEx
MultiByteToWideChar
lstrcmpiW
GetLastError
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
RemoveDirectoryW
GetModuleHandleA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
WriteFile
GetConsoleCP
GetStartupInfoA
SetHandleCount
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
CreateMutexW
LCMapStringA
RtlUnwind
GetStartupInfoW
GetStdHandle
GetFileType
WriteConsoleW
GetCPInfo
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
OutputDebugStringW
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
CreateFileA
TlsFree
TlsAlloc
FindClose
FindNextFileW
FindFirstFileW
lstrcpyW
CreateDirectoryW
CreateThread
GetSystemDirectoryW
InterlockedCompareExchange
Sleep
GetSystemWindowsDirectoryW
FreeResource
MulDiv
CopyFileW
GetLongPathNameW
GetEnvironmentVariableW
InterlockedIncrement
InterlockedDecrement
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
DeviceIoControl
lstrlenW
FreeLibrary
LoadLibraryExW
CreateFileW
LocalAlloc
DeleteFileW
MoveFileExW
SetFileAttributesW
GetTempPathW
GetVersionExW
GetCurrentProcess
GetModuleHandleW
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
TlsSetValue
GetSystemTimeAsFileTime
ExitProcess
SystemTimeToFileTime
GetLocaleInfoA
InterlockedExchange
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LCMapStringW
GetCurrentProcessId
CloseHandle
CreateProcessW
GetModuleFileNameW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetConsoleMode
user32
SetWindowPos
CharNextW
BringWindowToTop
SetForegroundWindow
ShowWindow
IsIconic
FindWindowW
PostMessageW
IsWindow
SetWindowLongW
CreateDialogParamW
GetActiveWindow
GetSystemMenu
EnableMenuItem
LoadImageW
ReleaseCapture
GetDlgCtrlID
SystemParametersInfoW
SetCapture
AdjustWindowRectEx
GetMenu
GetParent
SetWindowTextW
PostQuitMessage
GetDlgItem
IsDialogMessageW
SetCursor
SetTimer
PtInRect
ClientToScreen
GetCapture
UpdateWindow
DrawFocusRect
GetSystemMetrics
InflateRect
DrawEdge
GetSysColor
IsWindowEnabled
KillTimer
OffsetRect
FillRect
InvalidateRect
EndPaint
DrawTextW
GetWindowTextW
GetClientRect
BeginPaint
CallWindowProcW
GetWindowLongW
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
SendMessageW
DestroyWindow
DefWindowProcW
MessageBoxW
ReleaseDC
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
GetDC
GetWindowRect
UnregisterClassA
gdi32
GetCurrentObject
GetStockObject
CreateSolidBrush
CreateDIBSection
BitBlt
StretchBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
DeleteDC
SetTextColor
SelectObject
SetBkMode
GetDeviceCaps
CreateFontW
advapi32
RegDeleteValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExA
shell32
SHGetSpecialFolderPathW
SHChangeNotify
ShellExecuteW
ole32
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
VarUI4FromStr
shlwapi
SHGetValueW
PathRemoveBackslashW
StrStrIW
SHSetValueW
SHDeleteKeyW
PathFileExistsW
PathCombineW
StrStrIA
PathAppendW
PathRemoveFileSpecW
comctl32
ImageList_SetImageCount
ImageList_Add
InitCommonControlsEx
ImageList_Create
_TrackMouseEvent
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
gdiplus
GdipCloneImage
GdipCreateBitmapFromStream
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdiplusStartup
GdipAlloc
GdipFree
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 166KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE