C:\vmagent_new\bin\joblist\660937\out\Release\360DeskAna.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cbe7fe9309e07298267c79def9cfaf297df32d8256238736b59f57f9d02d6dc1.exe
Resource
win7-20241023-en
General
-
Target
cbe7fe9309e07298267c79def9cfaf297df32d8256238736b59f57f9d02d6dc1
-
Size
295KB
-
MD5
f1ee17e085a523b474391d7862bdbb78
-
SHA1
49094b356cf3b9e4308013c36893255e3ab60db5
-
SHA256
cbe7fe9309e07298267c79def9cfaf297df32d8256238736b59f57f9d02d6dc1
-
SHA512
dda31876e47bb9833ca3272d7cfc6497b38dd74ac3e419ad3530dde3d9aeadd61044959a4189b0ca5050166d753a42dbf041bb04c9febcef46ab7507ec0ee041
-
SSDEEP
6144:pZXNDBn0Q8NIt8isPwfI+HUStCiaeYpFTVc32Gr9MY4k:nXgi2isPuODpRVcnr9MFk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cbe7fe9309e07298267c79def9cfaf297df32d8256238736b59f57f9d02d6dc1
Files
-
cbe7fe9309e07298267c79def9cfaf297df32d8256238736b59f57f9d02d6dc1.exe windows:5 windows x86 arch:x86
9d9ce2f8de2a7c068c8035727f872598
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
kernel32
OpenEventW
EnterCriticalSection
LeaveCriticalSection
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetExitCodeThread
OpenFileMappingW
MapViewOfFile
GetProcessId
UnmapViewOfFile
IsProcessInJob
QueryInformationJobObject
GetCommandLineW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
LoadLibraryW
ProcessIdToSessionId
GetCurrentProcessId
GetSystemDirectoryW
SetLastError
MultiByteToWideChar
LoadLibraryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
CreateEventW
GlobalFree
WideCharToMultiByte
GetLocalTime
DeviceIoControl
InitializeCriticalSection
RaiseException
GetStringTypeW
WriteFile
SetEvent
GlobalAlloc
ReadFile
GetModuleFileNameW
ExpandEnvironmentStringsW
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
TlsAlloc
LoadLibraryExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
GetCurrentProcess
TerminateProcess
Sleep
CreateProcessW
GetVersionExW
CloseHandle
OpenProcess
GetModuleHandleW
GetProcAddress
LCMapStringW
OutputDebugStringW
GetModuleHandleExW
ExitProcess
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
CreateMutexW
ReleaseMutex
OpenThread
GetCurrentThreadId
HeapWalk
HeapUnlock
HeapLock
SetFilePointerEx
CreateFileW
WaitForSingleObject
LocalFileTimeToFileTime
HeapCreate
GetFileSizeEx
CreateFileA
IsDebuggerPresent
user32
IsWindow
GetWindowThreadProcessId
FindWindowW
WaitForInputIdle
SendMessageW
advapi32
RevertToSelf
CreateProcessAsUserW
ImpersonateLoggedOnUser
DuplicateTokenEx
GetTokenInformation
OpenProcessToken
LookupAccountSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExA
ole32
CoInitializeSecurity
CoInitialize
CoCreateInstance
CoUninitialize
StringFromGUID2
CoSetProxyBlanket
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantClear
shlwapi
PathAppendW
PathRemoveFileSpecW
SHGetValueW
PathFindFileNameW
ws2_32
WSCDeinstallProvider
WSACleanup
WSCEnumProtocols
WSAStartup
WSCGetProviderPath
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
EnumProcesses
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
msvcrt
__uncaught_exception
memchr
_CIpow
abort
tolower
isspace
??3@YAXPAX@Z
memcmp
__wgetmainargs
__setusermatherr
_initterm
__p__commode
__CxxFrameHandler
_wcslwr
_lock
_unlock
??0exception@@QAE@ABQBD@Z
_iob
___lc_codepage_func
wcstol
strtol
iswctype
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABV0@@Z
_beginthreadex
_msize
__set_app_type
_wcmdln
_control87
_XcptFilter
_fmode
mbtowc
strrchr
_isatty
fflush
_fileno
__pctype_func
_CIlog10
ceil
_clearfp
?terminate@@YAXXZ
_wcstoui64
realloc
_errno
??2@YAPAXI@Z
fputc
fwrite
___mb_cur_max_func
setlocale
memcpy
_CxxThrowException
memset
memmove
malloc
calloc
localeconv
ldexp
strtod
free
??0exception@@QAE@XZ
_wtoi
??_V@YAXPAX@Z
??_U@YAPAXI@Z
_wcsnicmp
_wcsicmp
wcschr
wcsstr
___lc_handle_func
msvcp60
_Getctype
_Wcrtomb
_Mbrtowc
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE