C:\vmagent_new\bin\joblist\726509\out\Release\360leakfixer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0bce8fbaa90aa2796a6bfba9a18c3d33d067fccc7dccaeda00ca7034a68edb9.exe
Resource
win7-20240903-en
General
-
Target
c0bce8fbaa90aa2796a6bfba9a18c3d33d067fccc7dccaeda00ca7034a68edb9
-
Size
288KB
-
MD5
3e0996b439d8cc8c99449f4745c430be
-
SHA1
d1056d8122e7752f151ba06cb668e4952fe1c691
-
SHA256
c0bce8fbaa90aa2796a6bfba9a18c3d33d067fccc7dccaeda00ca7034a68edb9
-
SHA512
65805c77ef7fcce50bb75b8a27677ecd9f48c09ad7694245b4c3d3c0f6cfe478777d06cabfef8fb5ab364434b73f5428ac45363723dbc0cdc958fd4a8e3080f9
-
SSDEEP
6144:yQUJEW+7nMlQ81ZWEbsPvTq5p7JBQ4dB8TDJJ79dQAdEZn:yQXc1oEbsP+hLbENBQwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0bce8fbaa90aa2796a6bfba9a18c3d33d067fccc7dccaeda00ca7034a68edb9
Files
-
c0bce8fbaa90aa2796a6bfba9a18c3d33d067fccc7dccaeda00ca7034a68edb9.exe windows:5 windows x86 arch:x86
f3daa7a1549ac0fb5c5e328fe504c003
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsWow64Process
FindResourceExW
FreeLibrary
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
LockResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
GetCommandLineA
CreateFileW
ReadFile
SetFilePointer
SetErrorMode
Sleep
GetCurrentThreadId
GetVersion
GetVersionExW
GetPrivateProfileStringW
GetCommandLineW
CreateProcessW
GetStartupInfoW
DeviceIoControl
InitializeCriticalSection
GetCurrentProcessId
VirtualProtect
GetSystemDirectoryW
GetCurrentProcess
CreateMutexW
GetModuleHandleExW
ExitProcess
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
IsProcessorFeaturePresent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
FormatMessageW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
WaitForSingleObject
ReleaseMutex
OpenThread
HeapWalk
HeapUnlock
HeapLock
SetFilePointerEx
GetFileSizeEx
CreateFileA
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
SetLastError
OutputDebugStringW
IsDebuggerPresent
GetLastError
RaiseException
CloseHandle
user32
CharNextW
SetForegroundWindow
FindWindowW
FindWindowExW
GetMessageW
TranslateMessage
WaitForInputIdle
DestroyWindow
PeekMessageW
BringWindowToTop
IsIconic
IsWindowVisible
ShowWindow
IsWindow
SendMessageTimeoutW
DispatchMessageW
advapi32
RegEnumKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
StrStrIW
PathFileExistsW
SHGetValueW
PathAddBackslashW
StrCmpNIW
PathFindFileNameW
PathAppendW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
imm32
ImmDisableIME
msvcrt
__CxxFrameHandler
__DestructExceptionObject
_wcslwr
___lc_codepage_func
__pctype_func
tolower
___mb_cur_max_func
??1exception@@UAE@XZ
strtol
localeconv
iswctype
calloc
__p__commode
abort
??0exception@@QAE@ABV0@@Z
realloc
memcmp
__p___wargv
__set_app_type
_wcmdln
_control87
_XcptFilter
_fmode
mbtowc
___lc_handle_func
strrchr
_initterm
_CIlog10
ceil
_clearfp
?terminate@@YAXXZ
_wcstoui64
__p___argc
__wgetmainargs
_amsg_exit
atoi
_wtoi64
_wcsnicmp
_wcsicmp
wcsncpy
wcsncmp
wcsrchr
??3@YAXPAX@Z
memset
memmove
memcpy
_CxxThrowException
malloc
free
wcsstr
wcschr
_errno
??_V@YAXPAX@Z
??2@YAPAXI@Z
??0exception@@QAE@ABQBD@Z
__setusermatherr
_msize
?what@exception@@UBEPBDXZ
wcstol
ntdll
ZwQueryVirtualMemory
NtDelayExecution
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwProtectVirtualMemory
ZwQuerySystemInformation
RtlCreateHeap
RtlAllocateHeap
RtlReAllocateHeap
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE