C:\vmagent_new\bin\joblist\857204\out\Release\360CleanHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93b981e1161ca39249cccdde97818de3d2df53d279c0e02123f01b27e50be619.exe
Resource
win7-20240903-en
General
-
Target
93b981e1161ca39249cccdde97818de3d2df53d279c0e02123f01b27e50be619
-
Size
1.4MB
-
MD5
46528ae85147be3dde09c38124df174c
-
SHA1
2a32bbaddd7db516b267c98bd6679d07e74a568b
-
SHA256
93b981e1161ca39249cccdde97818de3d2df53d279c0e02123f01b27e50be619
-
SHA512
c43d3670ddf86e766b7b416fbdfeab2643aaa17dbd98caca6c769047cdb268539a8a09cb14f8e393d0dd4d3a0d416064783b907a0528866556982edd3e43aa01
-
SSDEEP
24576:M4BfzcXd9HNJb3f37bU49XqOCGzfMp/1h3fAZb:PzcXd9td7bU0CGzf69h3fAV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93b981e1161ca39249cccdde97818de3d2df53d279c0e02123f01b27e50be619
Files
-
93b981e1161ca39249cccdde97818de3d2df53d279c0e02123f01b27e50be619.exe windows:5 windows x86 arch:x86
62abd7c6e0ded53b57195f77a6281af4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleFileNameExW
imm32
ImmDisableIME
kernel32
lstrlenW
GetLastError
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
RaiseException
InterlockedExchange
CreateMutexW
DeleteFileW
GetEnvironmentVariableW
WideCharToMultiByte
lstrlenA
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateFileW
ReadFile
GetFileSize
GetTempFileNameW
GetTempPathW
MoveFileW
SetFilePointer
CloseHandle
OpenProcess
GetVersion
GetSystemDirectoryW
GetLongPathNameW
FindClose
FindFirstFileW
ExpandEnvironmentStringsW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
GetSystemWindowsDirectoryW
FreeResource
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjects
CreateThread
GetTickCount
GetModuleFileNameW
FlushInstructionCache
SetLastError
GetPrivateProfileIntW
GetFullPathNameW
lstrcpyW
FindNextFileW
GlobalFree
GlobalAlloc
GlobalMemoryStatusEx
GetSystemInfo
OpenMutexW
GetDiskFreeSpaceExW
GetWindowsDirectoryW
FileTimeToSystemTime
GetCommandLineW
DeviceIoControl
GetACP
FormatMessageW
WriteFile
IsBadReadPtr
SetCurrentDirectoryW
GetSystemDefaultLCID
GetVolumeInformationW
FileTimeToLocalFileTime
GetFileType
DuplicateHandle
SystemTimeToFileTime
GetCurrentDirectoryW
DosDateTimeToFileTime
CreateDirectoryW
SetFileTime
FileTimeToDosDateTime
GetLocalTime
GetSystemTime
GetFileInformationByHandle
InterlockedDecrement
CreateFileMappingW
UnmapViewOfFile
MoveFileExW
CopyFileW
FlushFileBuffers
RemoveDirectoryW
GetFileAttributesW
GetCurrentThreadId
DeleteCriticalSection
InterlockedIncrement
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
SetHandleCount
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
HeapCreate
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoW
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
ExitProcess
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
FindResourceExW
LoadResource
LockResource
SizeofResource
TerminateProcess
Sleep
GetCurrentProcessId
FindResourceW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
InitializeCriticalSection
InterlockedCompareExchange
GetModuleHandleW
VirtualProtect
GetModuleHandleA
GetCurrentProcess
GetProcAddress
FreeLibrary
SetErrorMode
MapViewOfFile
user32
IsWindow
UnregisterClassA
BringWindowToTop
SetForegroundWindow
IsWindowEnabled
PrivateExtractIconsW
InvalidateRect
GetParent
CharNextW
GetIconInfo
CopyRect
IsRectEmpty
MessageBoxW
GetActiveWindow
FindWindowW
PostMessageW
SendMessageTimeoutW
GetWindowRect
WindowFromPoint
GetWindowThreadProcessId
GetDesktopWindow
GetForegroundWindow
GetAncestor
EnumDisplaySettingsW
GetMonitorInfoW
MonitorFromPoint
GetWindowInfo
GetWindow
GetShellWindow
SendMessageW
WaitForInputIdle
wsprintfW
ReleaseDC
GetDC
EnumWindows
FindWindowExW
ShowWindow
IsIconic
DispatchMessageW
TranslateMessage
GetMessageW
PostQuitMessage
SetTimer
MonitorFromWindow
MapWindowPoints
KillTimer
SetWindowPos
DefWindowProcW
SetWindowTextW
LoadIconW
PeekMessageW
GetClassInfoW
RegisterClassW
IsWindowVisible
SetActiveWindow
DestroyMenu
AppendMenuW
CreatePopupMenu
GetCursorPos
TrackPopupMenu
GetClientRect
DestroyIcon
DrawIconEx
SetRectEmpty
MoveWindow
GetLastInputInfo
SystemParametersInfoW
GetSystemMetrics
LoadImageW
DisableProcessWindowsGhosting
RegisterClassExW
LoadCursorW
GetClassInfoExW
CreateWindowExW
CallWindowProcW
GetWindowLongW
SetWindowLongW
DestroyWindow
gdi32
GetTextExtentPoint32W
DeleteDC
GetStockObject
GetObjectW
SelectObject
DeleteObject
advapi32
GetTokenInformation
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
shell32
ExtractIconW
SHGetFolderPathW
ShellExecuteW
ord165
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetFileInfoW
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
CLSIDFromString
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
SafeArrayLock
SafeArrayUnlock
SafeArrayCreate
SafeArrayRedim
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
SafeArrayCopy
VarUdateFromDate
VariantCopy
SysStringByteLen
SysAllocStringByteLen
DispCallFunc
VariantInit
SysFreeString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUI4FromStr
SysAllocString
shlwapi
PathIsDirectoryW
StrStrW
StrRStrIW
PathAppendW
PathAddExtensionW
PathStripToRootW
StrStrIW
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsW
SHGetValueW
PathCombineW
StrCmpIW
SHSetValueW
StrCmpNIW
PathAddBackslashW
PathFindExtensionW
comctl32
InitCommonControlsEx
gdiplus
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdiplusStartup
GdiplusShutdown
GdipBitmapGetPixel
GdipBitmapLockBits
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipGetImageThumbnail
GdipDisposeImage
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRectI
GdipDrawImageRectRect
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipResetWorldTransform
GdipSetSmoothingMode
GdipDeleteGraphics
GdipFree
version
VerQueryValueW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
crypt32
CertGetNameStringW
rpcrt4
NdrClientCall2
Sections
.text Size: 1018KB - Virtual size: 1018KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE