C:\vmagent_new\bin\joblist\546626\out\Release\360Inst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
217dd1d6124718ef011793270778dd106940c8e34a98acc0d54676006d13c6f5.exe
Resource
win7-20240708-en
General
-
Target
217dd1d6124718ef011793270778dd106940c8e34a98acc0d54676006d13c6f5
-
Size
2.8MB
-
MD5
e9a0dff4eedb35a57edb429eb4ccf2cb
-
SHA1
693f269078a88a3b214907ade5b616ce87a784c9
-
SHA256
217dd1d6124718ef011793270778dd106940c8e34a98acc0d54676006d13c6f5
-
SHA512
21f2fc84a9e520ff6a4d070d27eeabdb37a29d86e22e6f8b7a8644bdb9497b6c15c68d894ec958cc2613ee4f8a24771a90eae7b17b568c7a0bfc8c49ee37f840
-
SSDEEP
49152:S6AX9jq67rEmD7oT4PQlTD2G3mGF4b6KzgLwznX:acYEmD7oT4m2CfF4u6gLwD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 217dd1d6124718ef011793270778dd106940c8e34a98acc0d54676006d13c6f5
Files
-
217dd1d6124718ef011793270778dd106940c8e34a98acc0d54676006d13c6f5.exe windows:5 windows x86 arch:x86
ed981ca8d6a3bf01a7179455c941e0eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
SHGetValueA
PathCombineA
PathFindFileNameW
StrStrIW
UrlCanonicalizeW
UrlCanonicalizeA
wvnsprintfW
SHGetValueW
PathCombineW
SHSetValueA
PathRemoveFileSpecW
StrStrIA
PathFileExistsW
PathIsDirectoryW
PathAppendW
PathIsRootW
kernel32
LoadResource
FindResourceW
SetLastError
GetFullPathNameW
FindFirstFileW
GetCurrentThreadId
InterlockedIncrement
DebugBreak
OutputDebugStringW
lstrlenA
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GetLastError
GetTickCount
GetExitCodeThread
ResumeThread
GetWindowsDirectoryW
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
GetSystemDirectoryW
lstrcmpiW
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
GetModuleHandleW
MulDiv
GetVersionExW
GetDiskFreeSpaceExW
GlobalFree
GlobalLock
GlobalAlloc
GetFileSizeEx
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileAttributesExW
GetExitCodeProcess
TerminateProcess
Module32FirstW
CopyFileW
OpenProcess
WideCharToMultiByte
GlobalFindAtomW
TlsSetValue
TlsGetValue
TlsAlloc
SetEvent
CreateThread
CreateEventW
GetFileType
GetLongPathNameW
GetDriveTypeW
LoadLibraryA
GetSystemDirectoryA
InterlockedCompareExchange
CreateFileA
GetCurrentThread
VirtualAlloc
VirtualQuery
GetSystemInfo
GetThreadContext
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
VirtualProtect
GetDriveTypeA
GetTimeZoneInformation
GetConsoleOutputCP
FlushFileBuffers
SizeofResource
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
LCMapStringA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
SetHandleCount
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
HeapSize
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapReAlloc
GetStartupInfoW
GetStdHandle
WriteConsoleW
ExitProcess
ExitThread
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
lstrcmpiA
lstrcmpA
GetModuleHandleA
QueryPerformanceFrequency
QueryPerformanceCounter
ResetEvent
GetUserDefaultLangID
MoveFileW
InterlockedExchangeAdd
FreeLibraryAndExitThread
GetModuleHandleExW
CreateWaitableTimerW
SetWaitableTimer
CreateSemaphoreW
WaitForMultipleObjects
ReleaseSemaphore
TlsFree
HeapWalk
HeapLock
HeapUnlock
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
LocalAlloc
GlobalUnlock
FreeResource
LockResource
SetStdHandle
WriteFile
SetErrorMode
SetUnhandledExceptionFilter
Sleep
MoveFileExW
SetEnvironmentVariableA
CreateMutexW
WaitForSingleObject
GetLocalTime
ReleaseMutex
DeleteFileW
ReadFile
SetFilePointer
GetCurrentProcessId
DeviceIoControl
LoadLibraryW
FindClose
FindNextFileW
InterlockedDecrement
GetCurrentProcess
FlushInstructionCache
lstrlenW
lstrcpyW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RemoveDirectoryW
LeaveCriticalSection
EnterCriticalSection
RaiseException
InterlockedExchange
CreateDirectoryW
GetFileAttributesW
CreateFileW
GetFileSize
CloseHandle
CompareStringA
CompareStringW
WriteConsoleA
user32
UnregisterClassA
SetScrollInfo
GetDesktopWindow
InflateRect
MoveWindow
UnregisterClassW
GetFocus
CallNextHookEx
CheckDlgButton
SetWindowsHookExW
IsDlgButtonChecked
GetDlgItemTextW
CreateDialogParamW
GetDlgCtrlID
GetClassNameW
UnhookWindowsHookEx
ShowScrollBar
SetScrollPos
GetScrollRange
GetScrollPos
SetFocus
GetScrollInfo
GetCursorPos
GetSystemMenu
DestroyMenu
EnableMenuItem
FindWindowExW
LoadIconW
PostQuitMessage
IsDialogMessageW
UpdateWindow
GetWindowPlacement
BringWindowToTop
KillTimer
RegisterClassExW
EnableWindow
GetClassInfoExW
IsIconic
ExitWindowsEx
GetSysColor
SetDlgItemTextW
SetTimer
CharUpperW
DrawTextW
GetSystemMetrics
LoadImageW
EndPaint
BeginPaint
LoadBitmapW
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindow
SetWindowRgn
GetDlgItem
GetParent
RedrawWindow
IsWindowVisible
ScreenToClient
GetWindowRect
SetWindowPos
SetWindowTextW
CreateWindowExW
EndDialog
GetWindowLongW
ReleaseDC
GetDC
GetWindowTextW
LoadCursorW
SetCursor
OffsetRect
PtInRect
CopyRect
IsWindowEnabled
InvalidateRect
GetClientRect
CallWindowProcW
DrawStateW
DefWindowProcW
DestroyWindow
wsprintfW
GetActiveWindow
DialogBoxParamW
CharNextW
CharLowerW
SetForegroundWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
MessageBoxW
LoadStringW
ShowWindow
SendMessageW
SetWindowLongW
wvsprintfW
PostMessageW
gdi32
GetBitmapBits
SetBitmapBits
CreateRectRgn
ExtSelectClipRgn
CreateFontIndirectW
CreateRoundRectRgn
CreateFontW
GetObjectW
SetTextColor
SetBkMode
CreateCompatibleBitmap
BitBlt
SelectObject
CreateCompatibleDC
GetTextExtentPoint32W
RestoreDC
SaveDC
DeleteObject
CreateSolidBrush
GetDeviceCaps
DeleteDC
advapi32
RegEnumKeyExW
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegOpenKeyW
RegNotifyChangeKeyValue
RegEnumKeyExA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
shell32
SHGetSpecialFolderPathW
SHBrowseForFolderW
Shell_NotifyIconW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
SHCreateDirectoryExW
ole32
CoCreateInstance
OleRun
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CLSIDFromProgID
CreateStreamOnHGlobal
CoInitialize
oleaut32
GetErrorInfo
VariantChangeType
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreate
SysFreeString
OleLoadPicture
VarUI4FromStr
SysAllocString
VariantClear
VariantInit
comctl32
_TrackMouseEvent
InitCommonControlsEx
setupapi
SetupIterateCabinetW
wininet
HttpSendRequestW
HttpQueryInfoW
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InternetErrorDlg
InternetOpenW
InternetOpenUrlW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetNetworkParams
GetAdaptersInfo
secur32
InitializeSecurityContextA
FreeCredentialsHandle
AcquireCredentialsHandleA
rasapi32
RasEnumConnectionsW
RasGetConnectStatusW
Sections
.text Size: 844KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 178KB - Virtual size: 493KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE