C:\vmagent_new\bin\joblist\720202\out\Release\DumpUper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7d7357d73f0251a2b3cb8cb6534855fa7bb9648474bd96889d1b89bbe11b4c35.exe
Resource
win7-20240729-en
General
-
Target
7d7357d73f0251a2b3cb8cb6534855fa7bb9648474bd96889d1b89bbe11b4c35
-
Size
733KB
-
MD5
e0b6e77863029d2780d5d1836153097e
-
SHA1
f7347bfe3e6652a60d6209f23d87474ddd5a6198
-
SHA256
7d7357d73f0251a2b3cb8cb6534855fa7bb9648474bd96889d1b89bbe11b4c35
-
SHA512
5ff95db61bd38c1750b82352500145a3c66b4d363a6bcd02e4fb196c5d84df0ce27d94ded937c608a19b3487b4be42139ae9ab4acd2ad751925dfbd416aba461
-
SSDEEP
12288:i5KzZhiQdGIQSYDmo4/3meBqNKy9AGZqpMvJZT3qtZF3NRqn6lsTsK/wbqHbmATt:oKzZh2IJWGqNAGZqpMjT3I3z+6lsTnoC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d7357d73f0251a2b3cb8cb6534855fa7bb9648474bd96889d1b89bbe11b4c35
Files
-
7d7357d73f0251a2b3cb8cb6534855fa7bb9648474bd96889d1b89bbe11b4c35.exe windows:5 windows x86 arch:x86
91bb7519496363bd6a6985e458f67a73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
FindResourceExW
ReadFile
GetFileSize
FlushInstructionCache
GetCurrentThreadId
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
LoadLibraryExW
CreateDirectoryW
GetWindowsDirectoryW
DeleteFileW
WritePrivateProfileStringW
GetTickCount
GetPrivateProfileSectionW
LocalFree
GetCommandLineW
WaitForSingleObject
CreateThread
GetEnvironmentVariableW
WritePrivateProfileSectionW
CreateProcessW
CreateFileA
Sleep
InterlockedCompareExchange
WriteFile
SetFilePointer
GetNativeSystemInfo
DeleteFileA
GetPrivateProfileStringW
GetFileAttributesExA
GetPrivateProfileStringA
GetPrivateProfileIntA
WideCharToMultiByte
GetACP
GetModuleFileNameA
GetTempPathW
GetExitCodeProcess
GetVersionExW
lstrcpynW
MulDiv
DeviceIoControl
GetCurrentProcessId
GetPrivateProfileSectionNamesW
GetCurrentThread
VirtualQuery
VirtualAlloc
GetSystemInfo
VirtualFree
ResumeThread
GetThreadContext
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
VirtualProtectEx
IsValidCodePage
GetOEMCP
FindResourceW
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoW
GetStdHandle
GetFileType
WriteConsoleW
SetEndOfFile
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetSystemTimeAsFileTime
InterlockedExchange
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
LoadResource
LockResource
SizeofResource
GetSystemWindowsDirectoryA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
CreateFileW
GetFileSizeEx
CloseHandle
LoadLibraryW
GetProcAddress
GetTempPathA
GetModuleFileNameW
GetSystemDirectoryW
GetProcessHeap
HeapFree
RaiseException
GetCurrentProcess
HeapAlloc
GetConsoleCP
GetConsoleMode
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetStartupInfoA
SetStdHandle
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
OutputDebugStringW
CreateMutexW
GetModuleHandleA
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetLocaleInfoA
GetStringTypeA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
CompareStringA
CompareStringW
MultiByteToWideChar
TlsFree
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
SetEnvironmentVariableA
GetTimeZoneInformation
user32
IsDlgButtonChecked
SetWindowLongW
CharNextW
wsprintfW
UnregisterClassA
ReleaseDC
FindWindowW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
GetDC
GetDlgItemTextW
CheckDlgButton
EnableWindow
KillTimer
SetTimer
ShowWindow
SetWindowTextW
GetWindowLongW
SendMessageW
EndDialog
DefWindowProcW
GetActiveWindow
DialogBoxParamW
DestroyWindow
gdi32
CreateSolidBrush
GetDeviceCaps
DPtoLP
CreateFontIndirectW
GetStockObject
DeleteObject
CreateFontW
SetBkMode
advapi32
RegSetValueExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetUserNameW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
shell32
CommandLineToArgvW
ExtractIconW
ShellExecuteExW
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathRemoveBackslashA
PathFindFileNameA
StrStrIW
PathFileExistsW
SHGetValueW
PathAppendW
SHSetValueW
PathFindFileNameW
PathFileExistsA
SHGetValueA
StrCmpNIW
PathCombineW
comctl32
InitCommonControlsEx
wininet
DeleteUrlCacheEntryW
InternetCloseHandle
InternetReadFile
InternetWriteFile
InternetAttemptConnect
InternetConnectA
InternetOpenA
HttpSendRequestExA
HttpEndRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
HttpSendRequestA
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
wintrust
CryptCATAdminReleaseCatalogContext
WinVerifyTrust
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminReleaseContext
CryptCATAdminAcquireContext
Sections
.text Size: 361KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 163KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE