C:\vmagent_new\bin\joblist\671488\out\Release\ZhuDongFangYu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7cffb9b468e79dbd437380b15fac936ca2c1b3555a17c205169d8b948cb0739f.exe
Resource
win7-20240903-en
General
-
Target
7cffb9b468e79dbd437380b15fac936ca2c1b3555a17c205169d8b948cb0739f
-
Size
329KB
-
MD5
9316028a31070bbd4cffbe7cd22647a0
-
SHA1
26f1f586995f55a38e09a6d29dd005b93762fb1c
-
SHA256
7cffb9b468e79dbd437380b15fac936ca2c1b3555a17c205169d8b948cb0739f
-
SHA512
033424c5766adde27ca12f32b0e6267c043d0ce91f3e648056827d39b8180de1fbe02cf0e9d78a1d27686cf0f24cb884dab2df9443de07dc87d23ed22ff843bf
-
SSDEEP
6144:97/5B/FLxbiXY8UeL/jFRZkQtpSJPjCcxmLguntnIK4xYj59so:JjDiXY8UerpRZHzS5RwgGBIVYN9J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cffb9b468e79dbd437380b15fac936ca2c1b3555a17c205169d8b948cb0739f
Files
-
7cffb9b468e79dbd437380b15fac936ca2c1b3555a17c205169d8b948cb0739f.exe windows:5 windows x86 arch:x86
152b905399dae28bb4f28c3e63e2d227
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
Thread32Next
FlushInstructionCache
OpenThread
WaitForMultipleObjects
VirtualProtect
GetThreadTimes
GetSystemTimeAsFileTime
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
OutputDebugStringW
CreateMutexW
GetFileSizeEx
SetUnhandledExceptionFilter
GetTempPathW
GetProcessId
SetLastError
WTSGetActiveConsoleSessionId
Process32NextW
OpenProcess
ProcessIdToSessionId
GetWindowsDirectoryW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
DeviceIoControl
CreateFileW
FindResourceExW
GetLongPathNameW
HeapFree
GetProcessHeap
HeapAlloc
GetCommandLineW
SetEvent
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
SetConsoleCtrlHandler
CreateEventW
WaitForSingleObject
CreateThread
GetTickCount
InterlockedCompareExchange
Sleep
GetVersionExW
GetSystemWindowsDirectoryW
GetCurrentProcess
LockResource
FreeResource
CloseHandle
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
Thread32First
RaiseException
lstrcmpiW
lstrlenW
GetModuleFileNameW
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetProcAddress
GetModuleHandleW
LocalFree
LocalAlloc
ReadFile
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
WriteFile
HeapCreate
MultiByteToWideChar
GetProcessTimes
VirtualAlloc
VirtualFree
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
HeapSize
HeapReAlloc
HeapDestroy
GetModuleHandleA
user32
PostMessageW
FindWindowW
LoadStringW
DispatchMessageW
PeekMessageW
PostThreadMessageW
CharNextW
advapi32
RegCreateKeyW
QueryServiceConfig2W
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
DuplicateToken
CreateProcessAsUserW
DuplicateTokenEx
RegQueryValueExW
StartServiceW
SetServiceObjectSecurity
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
QueryServiceObjectSecurity
OpenThreadToken
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorOwner
IsValidSid
GetLengthSid
CopySid
SetSecurityDescriptorGroup
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
DeleteService
ControlService
ChangeServiceConfigW
CreateServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
ChangeServiceConfig2W
SetNamedSecurityInfoW
SetEntriesInAclW
BuildExplicitAccessWithNameW
GetNamedSecurityInfoW
DeleteAce
GetTrusteeNameW
EqualSid
GetExplicitEntriesFromAclW
LookupAccountSidW
RegQueryValueExA
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
StringFromGUID2
CoUninitialize
CoInitializeSecurity
CoRevokeClassObject
CoRegisterClassObject
oleaut32
VarUI4FromStr
VariantInit
RegisterTypeLi
SysStringLen
VariantClear
SysStringByteLen
SysAllocStringByteLen
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
shlwapi
PathAppendW
PathCombineW
SHSetValueW
SHDeleteValueW
PathIsDirectoryW
PathRemoveFileSpecW
StrCmpNIW
PathFileExistsW
PathAddBackslashW
SHGetValueW
version
VerQueryValueW
wtsapi32
WTSFreeMemory
WTSSendMessageW
WTSEnumerateSessionsW
WTSWaitSystemEvent
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
rpcrt4
RpcServerListen
NdrAsyncServerCall
RpcServerUnregisterIf
RpcServerUseProtseqEpW
RpcMgmtStopServerListening
RpcServerRegisterIfEx
NdrServerCall2
RpcAsyncCompleteCall
ntdll
NtSetInformationToken
RtlInitUnicodeString
RtlUnwind
psapi
GetModuleFileNameExW
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE