C:\vmagent_new\bin\joblist\624566\out\Release\360Inst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41f69a3a3b93d4ec38f3a4ad0244dabba533b44f069c3432f7dd2d5ec68c5812.exe
Resource
win7-20240903-en
General
-
Target
41f69a3a3b93d4ec38f3a4ad0244dabba533b44f069c3432f7dd2d5ec68c5812
-
Size
4.8MB
-
MD5
392964952a8c2271cb997e54908c4587
-
SHA1
13ac83179ea8d9db3662f6c073d9038f987ef45a
-
SHA256
41f69a3a3b93d4ec38f3a4ad0244dabba533b44f069c3432f7dd2d5ec68c5812
-
SHA512
19f7e9c839871681d597a4cd5b8e6f842909879ecc828243fc3c13ae59cc2e1a8afc858eb871e3b218d746d46a49814801eba9ad2d5af1af5f8317402d2ba136
-
SSDEEP
24576:0gvAyBFEEW/mixfuKPTmasMSCf0dfC+zNb9TsRX9Pu3mmGld6oKZmMP+g9/Vr39T:jA40xFPsMSewfCONBTgG3mmhHmMP+gV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41f69a3a3b93d4ec38f3a4ad0244dabba533b44f069c3432f7dd2d5ec68c5812
Files
-
41f69a3a3b93d4ec38f3a4ad0244dabba533b44f069c3432f7dd2d5ec68c5812.exe windows:5 windows x86 arch:x86
acfef535e8b5c72c202946df51365728
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
SHGetValueA
PathCombineA
UrlCanonicalizeW
UrlCanonicalizeA
wvnsprintfW
PathFindFileNameW
StrStrIW
SHGetValueW
PathCombineW
PathRemoveFileSpecW
PathFileExistsW
PathIsRootW
PathIsDirectoryW
PathAppendW
SHSetValueA
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
WriteFile
LockResource
SizeofResource
LoadResource
FindResourceW
SetLastError
GetFullPathNameW
FindFirstFileW
GetCurrentThreadId
InterlockedIncrement
DebugBreak
OutputDebugStringW
lstrlenA
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GetLastError
GetTickCount
GetExitCodeThread
ResumeThread
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiW
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
GetModuleHandleW
MulDiv
GetProcAddress
GetVersionExW
GetDiskFreeSpaceExW
GlobalFree
GlobalLock
GlobalAlloc
GetFileSizeEx
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileAttributesExW
GetExitCodeProcess
TerminateProcess
Module32FirstW
GetSystemDirectoryW
CopyFileW
OpenProcess
WideCharToMultiByte
GlobalFindAtomW
TlsSetValue
TlsGetValue
TlsAlloc
SetEvent
CreateThread
CreateEventW
GetFileType
GetLongPathNameW
GetDriveTypeW
InterlockedCompareExchange
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
FlushFileBuffers
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
LCMapStringW
LCMapStringA
GetStartupInfoA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
GetConsoleMode
GetConsoleCP
HeapSize
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapReAlloc
GetStartupInfoW
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
RtlUnwind
lstrcmpiA
lstrcmpA
GetSystemDirectoryA
GetModuleHandleA
QueryPerformanceFrequency
QueryPerformanceCounter
ResetEvent
GetUserDefaultLangID
MoveFileW
InterlockedExchangeAdd
FreeLibraryAndExitThread
GetModuleHandleExW
CreateWaitableTimerW
SetWaitableTimer
CreateSemaphoreW
WaitForMultipleObjects
ReleaseSemaphore
TlsFree
HeapWalk
HeapLock
OpenThread
HeapUnlock
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
Sleep
GlobalUnlock
SetErrorMode
FreeResource
RaiseException
InterlockedExchange
MoveFileExW
CreateMutexW
WaitForSingleObject
GetLocalTime
ReleaseMutex
DeleteFileW
ReadFile
SetFilePointer
GetCurrentProcessId
DeviceIoControl
LoadLibraryW
FindClose
FindNextFileW
InterlockedDecrement
GetCurrentProcess
FlushInstructionCache
lstrlenW
lstrcpyW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RemoveDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryW
GetFileAttributesW
CreateFileW
GetFileSize
SetEnvironmentVariableA
CloseHandle
GetTimeZoneInformation
GetDriveTypeA
CompareStringA
CompareStringW
GetStringTypeA
user32
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
SetForegroundWindow
CharLowerW
SetWindowLongW
DialogBoxParamW
GetActiveWindow
DestroyWindow
DefWindowProcW
DrawStateW
CallWindowProcW
GetClientRect
InvalidateRect
IsWindowEnabled
wvsprintfW
PostMessageW
MessageBoxW
PtInRect
OffsetRect
SetCursor
LoadCursorW
GetWindowTextW
GetDC
ReleaseDC
GetWindowLongW
UnregisterClassA
UnregisterClassW
wsprintfW
GetDlgCtrlID
GetDesktopWindow
GetFocus
EndDialog
CreateWindowExW
SetWindowTextW
InflateRect
SetScrollInfo
LoadStringW
ShowWindow
CopyRect
SendMessageW
CallNextHookEx
UnhookWindowsHookEx
CheckDlgButton
SetWindowsHookExW
IsDlgButtonChecked
GetDlgItemTextW
CreateDialogParamW
GetClassNameW
CharNextW
ShowScrollBar
SetScrollPos
GetScrollRange
GetScrollPos
SetFocus
GetScrollInfo
GetCursorPos
GetSystemMenu
DestroyMenu
EnableMenuItem
FindWindowExW
LoadIconW
PostQuitMessage
IsDialogMessageW
UpdateWindow
GetWindowPlacement
BringWindowToTop
KillTimer
RegisterClassExW
EnableWindow
GetClassInfoExW
IsIconic
ExitWindowsEx
GetSysColor
SetDlgItemTextW
SetTimer
CharUpperW
GetSystemMetrics
LoadImageW
MoveWindow
EndPaint
BeginPaint
DrawTextW
LoadBitmapW
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindow
SetWindowRgn
GetDlgItem
GetParent
RedrawWindow
IsWindowVisible
ScreenToClient
GetWindowRect
SetWindowPos
gdi32
GetDeviceCaps
GetBitmapBits
SetBitmapBits
CreateRectRgn
ExtSelectClipRgn
CreateFontIndirectW
CreateRoundRectRgn
CreateFontW
GetObjectW
SetBkMode
CreateCompatibleBitmap
BitBlt
SelectObject
CreateCompatibleDC
GetTextExtentPoint32W
RestoreDC
SaveDC
DeleteDC
DeleteObject
SetTextColor
CreateSolidBrush
advapi32
RegOpenKeyExW
RegSetValueExA
RegDeleteKeyW
RegQueryValueExA
RegQueryValueExW
RegOpenKeyW
RegNotifyChangeKeyValue
RegCreateKeyExA
RegEnumKeyExA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
SHBrowseForFolderW
Shell_NotifyIconW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
SHCreateDirectoryExW
ole32
CoCreateInstance
OleRun
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CLSIDFromProgID
oleaut32
VariantChangeType
GetErrorInfo
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreate
SysFreeString
OleLoadPicture
VarUI4FromStr
SysAllocString
VariantClear
VariantInit
comctl32
_TrackMouseEvent
InitCommonControlsEx
msimg32
AlphaBlend
TransparentBlt
ws2_32
accept
WSAAsyncSelect
WSACancelAsyncRequest
__WSAFDIsSet
ioctlsocket
listen
shutdown
getpeername
WSASetLastError
sendto
recvfrom
bind
WSAGetLastError
WSCEnumProtocols
ntohs
htonl
ntohl
select
gethostname
WSAAsyncGetHostByName
inet_ntoa
socket
htons
connect
closesocket
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
WSACleanup
setupapi
SetupIterateCabinetW
wininet
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetOpenUrlW
InternetCloseHandle
HttpQueryInfoW
InternetErrorDlg
InternetOpenW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetNetworkParams
GetAdaptersInfo
secur32
InitializeSecurityContextA
FreeCredentialsHandle
AcquireCredentialsHandleA
rasapi32
RasEnumConnectionsW
RasGetConnectStatusW
Sections
.text Size: 764KB - Virtual size: 763KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE