C:\vmagent_new\bin\joblist\836940\out\Release\360zipUpdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c72ba883cd54ac147e9e77492d47fe5d6c961f352443e4f2d486145bd4c4ae5.exe
Resource
win7-20240903-en
General
-
Target
4c72ba883cd54ac147e9e77492d47fe5d6c961f352443e4f2d486145bd4c4ae5
-
Size
703KB
-
MD5
de6231f4c791e000b42503d23660ec25
-
SHA1
f2caa09955a0946edbe8a06a66073015c876e186
-
SHA256
4c72ba883cd54ac147e9e77492d47fe5d6c961f352443e4f2d486145bd4c4ae5
-
SHA512
009aded91523f878241bde3c800b8c0d23fb6a8aa0ab13b241a1d57ea168ccffdd3b507fc5ca40418ae590390e6d1a4df315b894192c44dd490e423cb272dae0
-
SSDEEP
12288:cyP7LNx9nRzf2DRUu+/eMBhVG6fAcXr/5OZ8q:bxBteDKTBG6fAm/5O/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c72ba883cd54ac147e9e77492d47fe5d6c961f352443e4f2d486145bd4c4ae5
Files
-
4c72ba883cd54ac147e9e77492d47fe5d6c961f352443e4f2d486145bd4c4ae5.exe windows:5 windows x86 arch:x86
d735d485951a6d66fdee9a67450bcbf0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
WritePrivateProfileStringW
FlushInstructionCache
GetTempPathW
RaiseException
GetPrivateProfileIntW
GetLastError
SetLastError
GetProcAddress
EnterCriticalSection
FindClose
LockResource
CreateEventW
lstrcmpiW
FindNextFileW
DeleteCriticalSection
GetCurrentThreadId
GetVersion
DeleteFileW
LocalFree
GetModuleFileNameA
CreateProcessW
MoveFileExW
OpenProcess
GetPrivateProfileStringA
CloseHandle
CreateFileW
DeviceIoControl
GetCurrentProcessId
WaitForMultipleObjects
InterlockedExchange
WideCharToMultiByte
GetFileSizeEx
GetCPInfoExW
SetFilePointer
SetEndOfFile
GetTickCount
WriteFile
ReadFile
GetCurrentThread
GetThreadContext
VirtualQuery
SetThreadPriority
VirtualAlloc
OpenThread
GetSystemInfo
GetThreadPriority
VirtualProtect
SuspendThread
ResumeThread
MultiByteToWideChar
WaitForSingleObject
GetSystemWindowsDirectoryW
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetModuleHandleA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetStartupInfoA
SetHandleCount
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
CompareStringW
GetStringTypeW
LCMapStringA
LCMapStringW
RtlUnwind
GetStartupInfoW
GetStdHandle
GetFileType
WriteConsoleW
GetCPInfo
CreateThread
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
CreateFileA
GetLocaleInfoA
HeapSize
LocalAlloc
HeapReAlloc
HeapDestroy
VirtualFree
GetModuleFileNameW
MulDiv
LeaveCriticalSection
GetVersionExW
SizeofResource
Sleep
LoadLibraryW
GetSystemDirectoryW
InitializeCriticalSection
GetPrivateProfileStringW
GetModuleHandleW
SetEvent
InterlockedCompareExchange
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
FindResourceExW
FreeResource
FindFirstFileW
CreateMutexW
GetTempFileNameW
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
ExitProcess
user32
DefWindowProcW
GetWindow
UnregisterClassA
DispatchMessageW
GetMonitorInfoW
SetWindowTextW
LoadCursorW
RegisterClassExW
IntersectRect
MoveWindow
SetWindowRgn
SetTimer
ScreenToClient
PostQuitMessage
TrackPopupMenu
LoadImageW
PostMessageW
DrawTextW
KillTimer
GetSubMenu
SetForegroundWindow
GetWindowInfo
WindowFromPoint
GetForegroundWindow
LoadIconW
OffsetRect
InvalidateRect
LoadMenuW
GetAncestor
GetDesktopWindow
GetCursorPos
IsWindow
FindWindowExW
CreateWindowExW
GetSystemMetrics
IsWindowVisible
SendMessageW
DestroyMenu
GetWindowThreadProcessId
GetShellWindow
EndPaint
DestroyWindow
GetWindowRect
GetMessageW
CharNextW
DialogBoxParamW
GetParent
GetClientRect
BeginPaint
GetDC
TranslateMessage
GetWindowLongW
PeekMessageW
ReleaseDC
MonitorFromWindow
GetDlgItem
SetWindowLongW
EndDialog
SetWindowPos
ShowWindow
CreateDialogParamW
GetActiveWindow
MessageBoxW
MapWindowPoints
gdi32
CreateDIBSection
CreateCompatibleDC
GetObjectW
SetStretchBltMode
SetBkMode
DeleteObject
SelectObject
CreateRoundRectRgn
CreateSolidBrush
DeleteDC
GetDeviceCaps
CreateFontW
advapi32
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExA
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
shell32
ord165
ShellExecuteExW
Shell_NotifyIconW
CommandLineToArgvW
SHGetSpecialFolderPathW
ShellExecuteW
ord680
ole32
OleUninitialize
OleInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VariantInit
SysFreeString
SysStringByteLen
VarUI4FromStr
SysAllocStringByteLen
SysAllocString
SysStringLen
VariantClear
shlwapi
SHSetValueW
StrStrIW
StrStrIA
StrCmpIW
PathAppendW
PathCombineW
SHGetValueW
PathIsRelativeW
PathRemoveFileSpecW
PathFileExistsW
PathFindFileNameW
psapi
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
Sections
.text Size: 338KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 161KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE