C:\vmagent_new\bin\joblist\708170\out\Release\360FileAssoc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
73f5edef4c59993560b158bd772332ec0bf2eaca36b4b9075abd251de5ba8042.exe
Resource
win7-20241010-en
General
-
Target
73f5edef4c59993560b158bd772332ec0bf2eaca36b4b9075abd251de5ba8042
-
Size
1.1MB
-
MD5
8b49fc8c35850061dcaa30b763a2b0e6
-
SHA1
7137a8623ac2f001b35f20b7e0bb24186f31b581
-
SHA256
73f5edef4c59993560b158bd772332ec0bf2eaca36b4b9075abd251de5ba8042
-
SHA512
5e0243e9ba08ef60f2f4cf66aca0b9266dfe3eb8ca207b723bea3ea21bfb2fa3b961eb813062c2cb0ab928b08d65307832d91f7e90ec6c58e258ad6800fe680a
-
SSDEEP
24576:Ks2KBcZ/hFG5B6SiqkyhH8RJY4HoU3VxxE8uUnj8Vy7z9Z:52qcKi6hHhU3VxxE+j8ML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73f5edef4c59993560b158bd772332ec0bf2eaca36b4b9075abd251de5ba8042
Files
-
73f5edef4c59993560b158bd772332ec0bf2eaca36b4b9075abd251de5ba8042.exe windows:5 windows x86 arch:x86
83bc2d4e0f1078bc4d809e430c542ab7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
CreateMutexW
RaiseException
FlushInstructionCache
GetFileSizeEx
ReadFile
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
CreateFileA
GetFileSize
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
HeapAlloc
SystemTimeToFileTime
QueryPerformanceCounter
HeapFree
UnlockFile
LockFile
UnlockFileEx
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
FormatMessageW
HeapDestroy
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
FlushFileBuffers
HeapSize
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
OutputDebugStringA
GetVersionExA
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
LoadLibraryExW
DeviceIoControl
GetModuleHandleA
GetLocalTime
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualProtect
FlushViewOfFile
OpenFileMappingW
GetLongPathNameW
OpenProcess
MapViewOfFileEx
GetThreadLocale
SetThreadLocale
TerminateProcess
GetModuleHandleW
OpenThread
GetVersionExW
InterlockedExchange
GetNativeSystemInfo
ResetEvent
SetEvent
CreateEventW
SetEnvironmentVariableA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
CompareStringA
CompareStringW
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
GetCurrentProcess
SetLastError
GlobalFree
FindResourceW
GetCurrentThreadId
GetTempFileNameW
GetTempPathW
InterlockedIncrement
InterlockedDecrement
DeleteFileW
WideCharToMultiByte
MultiByteToWideChar
ExpandEnvironmentStringsW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
SetErrorMode
GetTickCount
OutputDebugStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
DeleteCriticalSection
InitializeCriticalSection
FindResourceExW
CloseHandle
SetFilePointer
WriteFile
CreateFileW
Sleep
InterlockedCompareExchange
GetModuleFileNameW
GetCurrentProcessId
EnterCriticalSection
GetProcAddress
LeaveCriticalSection
IsDebuggerPresent
UnhandledExceptionFilter
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
TlsSetValue
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GlobalAlloc
lstrlenA
GetLastError
GetModuleHandleExW
lstrlenW
LoadLibraryW
FreeLibrary
LockResource
LoadResource
SizeofResource
user32
SetActiveWindow
BringWindowToTop
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
IsWindow
SendMessageTimeoutW
DefWindowProcW
DestroyWindow
CallWindowProcW
GetParent
GetDesktopWindow
GetWindowThreadProcessId
ShowWindow
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowPos
UnregisterClassA
SetWindowLongW
RegisterClassExW
GetWindowLongW
MapWindowPoints
GetClientRect
CopyRect
PostMessageW
FindWindowW
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
PostQuitMessage
GetClassNameW
FindWindowExW
MessageBoxW
CreateWindowExW
LoadCursorW
GetClassInfoExW
advapi32
RegCloseKey
RegEnumKeyExW
RegQueryValueExA
RegOpenKeyExW
GetUserNameA
LookupAccountNameA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegQueryValueExW
shell32
FindExecutableW
ShellExecuteW
ord165
SHGetFolderPathW
ole32
CoUninitialize
CoLoadLibrary
CoInitialize
oleaut32
DispCallFunc
VariantClear
VariantInit
SysStringLen
SysAllocString
SysFreeString
shlwapi
StrCpyNW
PathIsPrefixW
PathRemoveBackslashW
PathAppendW
PathFindFileNameW
PathCombineW
PathFindExtensionW
PathCanonicalizeW
PathRemoveExtensionW
SHGetValueW
PathRemoveFileSpecW
StrCmpNIW
PathAddBackslashW
PathFileExistsW
gdiplus
GdiplusShutdown
GdiplusStartup
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
Sections
.text Size: 799KB - Virtual size: 798KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE