C:\vmagent_new\bin\joblist\651125\out\Release\Release\LiveUpdate360.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84ef2e8cfff96f758d46e46ad90bd40fb39d54498d0f96fed7ae6e7658fde07d.exe
Resource
win7-20240708-en
General
-
Target
84ef2e8cfff96f758d46e46ad90bd40fb39d54498d0f96fed7ae6e7658fde07d
-
Size
719KB
-
MD5
efc3a6955b92ee3bde2346b874314a87
-
SHA1
a3ac58dc9599dd630b6bd8ac685b5f6fea35bc31
-
SHA256
84ef2e8cfff96f758d46e46ad90bd40fb39d54498d0f96fed7ae6e7658fde07d
-
SHA512
55d83f3a4be6171555fa20a30e61b1b9a278ea1113663b4381d76c377676d8e7cc1f9a3a1bab3a0ec22f41771eb78e16f07027611cfb92b45dbf4ac91e1fd698
-
SSDEEP
12288:YTl6AlE63dbar1eRpyJBtJeRoyjBBjWJ3sf1mLfNXKrEVmLoLPGeNW+JDT8bTHYU:wMAlEAd+heRpyztJeRoyjEsf1sfUoTGl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84ef2e8cfff96f758d46e46ad90bd40fb39d54498d0f96fed7ae6e7658fde07d
Files
-
84ef2e8cfff96f758d46e46ad90bd40fb39d54498d0f96fed7ae6e7658fde07d.exe windows:5 windows x86 arch:x86
71b49578b14f1271252b52accaa519f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
GetCurrentThreadId
GetModuleFileNameW
InterlockedDecrement
GetLastError
TerminateProcess
CloseHandle
ReleaseMutex
SetLastError
OpenProcess
CreateMutexW
SetCurrentDirectoryW
RemoveDirectoryW
SetErrorMode
DeleteFileA
lstrlenW
GetVersionExW
GetCommandLineW
ReadFile
SetFilePointer
GetFileType
CreateFileW
InitializeCriticalSection
GetTickCount
MultiByteToWideChar
WritePrivateProfileStringW
WriteFile
GetPrivateProfileIntW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetPrivateProfileStringW
GetFileSize
Sleep
GetTempPathW
MoveFileW
WideCharToMultiByte
SystemTimeToFileTime
GetSystemTime
GetFileAttributesExW
CreateThread
lstrlenA
DeviceIoControl
InterlockedIncrement
lstrcmpiW
SetEndOfFile
GetFileSizeEx
WaitForSingleObject
GetLocalTime
CreateDirectoryW
LoadLibraryExW
InterlockedCompareExchange
HeapFree
GetProcessHeap
GetCurrentProcess
FlushInstructionCache
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTimeZoneInformation
SetEnvironmentVariableA
DeleteCriticalSection
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
LCMapStringA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
QueryPerformanceCounter
HeapCreate
GetStartupInfoA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
RtlUnwind
GetStartupInfoW
lstrcmpiA
lstrcmpA
SleepEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
InterlockedExchange
GetModuleHandleW
GetSystemDirectoryW
FindFirstFileW
DeleteFileW
FindNextFileW
FindClose
GetCurrentProcessId
LoadLibraryW
GetVersionExA
ExpandEnvironmentStringsA
FormatMessageA
GetSystemDirectoryA
GetModuleHandleA
SetEvent
TlsFree
TlsAlloc
HeapWalk
HeapLock
OpenThread
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
HeapDestroy
GetProcAddress
CompareStringW
HeapReAlloc
HeapSize
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
FreeLibrary
user32
GetWindowThreadProcessId
PostMessageW
CreateWindowExW
FindWindowW
ShowWindow
UnregisterClassA
GetActiveWindow
MessageBoxW
RegisterClassExW
DestroyWindow
PeekMessageW
SendMessageTimeoutW
SetForegroundWindow
LockSetForegroundWindow
DefWindowProcW
DestroyIcon
CreatePopupMenu
DestroyMenu
AppendMenuW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
GetClassInfoExW
SetWindowLongW
IsHungAppWindow
OffsetRect
InvalidateRect
UpdateWindow
EnableWindow
CopyRect
PtInRect
GetAsyncKeyState
DialogBoxParamW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetClientRect
MapWindowPoints
SetWindowPos
ScreenToClient
CharNextW
GetMonitorInfoW
EndDialog
CallWindowProcW
LoadImageW
GetSystemMenu
DeleteMenu
GetCursorPos
IsWindowVisible
TrackPopupMenu
PostQuitMessage
WindowFromPoint
IsWindow
IsChild
KillTimer
SetTimer
SetWindowTextW
SendMessageW
GetWindowLongW
MonitorFromPoint
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
OpenProcessToken
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
RegQueryValueExW
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ExtractIconExW
Shell_NotifyIconW
SHFileOperationW
ShellExecuteW
ole32
CoCreateInstance
CLSIDFromProgID
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SysStringByteLen
SysAllocStringByteLen
VariantCopy
VarUI4FromStr
DispCallFunc
VariantClear
VariantInit
SysAllocString
SysFreeString
shlwapi
PathAppendW
PathFileExistsW
SHGetValueW
PathRemoveFileSpecW
StrStrIW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
SHGetValueA
PathCombineW
SHSetValueA
comctl32
InitCommonControlsEx
psapi
EnumProcessModules
GetModuleFileNameExW
version
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ws2_32
WSASetLastError
connect
getpeername
freeaddrinfo
ntohs
WSAStartup
bind
htons
select
getsockopt
__WSAFDIsSet
inet_addr
sendto
getsockname
send
recv
closesocket
recvfrom
gethostbyname
socket
ioctlsocket
setsockopt
htonl
WSACleanup
WSAGetLastError
getaddrinfo
Sections
.text Size: 490KB - Virtual size: 489KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE