Behavioral task
behavioral1
Sample
e842f8b8db410611768a0993f6f64d534435a00d8af885037b86603421dce648.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e842f8b8db410611768a0993f6f64d534435a00d8af885037b86603421dce648.exe
Resource
win10v2004-20220812-en
General
-
Target
e842f8b8db410611768a0993f6f64d534435a00d8af885037b86603421dce648
-
Size
260KB
-
MD5
6f18291383ce9c7bf4455659099e3de0
-
SHA1
41b0c13640a608128456a35e789e1263bb65bdca
-
SHA256
e842f8b8db410611768a0993f6f64d534435a00d8af885037b86603421dce648
-
SHA512
ff30e64f76f1e99b10681ad0c3001978d3567b86a525c03c1353cf110b3d6cbc36a25296ed40646fd76a22d3d9dd3e0369928c502dad3c81011ae6119dbc523d
-
SSDEEP
3072:IYs6rXv1uG5t5GPf5cgbvyIuCcBXgdNnAtzeLolrs8insNWqngwUY:DQBZbkvXgdce8NsJnsNBR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e842f8b8db410611768a0993f6f64d534435a00d8af885037b86603421dce648.exe windows x86
4fba1188fc4110e602699cda1747e2bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetSetCookieW
qqmusiccommon
?Log@qqmusic@@YAXPB_W0ZZ
?FindProcessByProcessMap@CUtil@@SAHAAV?$set@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@U?$less@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@std@@V?$allocator@V?$CStringT@_WV?$StrTraitATL@_WV?$ChTraitsCRT@_W@ATL@@@ATL@@@ATL@@@4@@std@@@Z
?SetIEFeatureEnabled@CUtil@@SAHW4QQMUSIC_INTERNETFEATURELIST@1@H@Z
?WriteLog@qqmusic@@YAXKPB_WZZ
kernel32
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
GetCommandLineW
FlushInstructionCache
GetCurrentProcess
SetLastError
TerminateThread
ResetEvent
OpenProcess
SetProcessWorkingSetSize
GetVersion
WaitForMultipleObjects
RaiseException
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetModuleHandleW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrlenW
MultiByteToWideChar
FreeEnvironmentStringsA
ExitProcess
GetModuleFileNameA
GetStdHandle
WriteFile
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapCreate
GetStartupInfoW
CreateEventW
CreateThread
SetFilePointer
Sleep
ExitThread
IsDebuggerPresent
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
TerminateProcess
VirtualQuery
GetSystemInfo
GetModuleHandleA
VirtualProtect
RtlUnwind
GetLastError
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
WaitForSingleObject
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
EnterCriticalSection
GetEnvironmentStrings
SetStdHandle
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedCompareExchange
UnhandledExceptionFilter
user32
FindWindowExW
SendMessageW
GetDlgItem
EndPaint
BeginPaint
GetWindow
GetClassNameW
AdjustWindowRectEx
GetClientRect
FillRect
CallWindowProcW
GetWindowLongW
GetDesktopWindow
DefWindowProcW
SetTimer
PostMessageW
ShowWindow
CreateWindowExW
DestroyWindow
MoveWindow
SetWindowLongW
IsWindow
CharUpperW
CharNextW
PostThreadMessageW
GetMessageW
DispatchMessageW
TranslateMessage
RegisterClassExW
LoadCursorW
GetClassInfoExW
PostQuitMessage
KillTimer
UnregisterClassA
gdi32
DeleteObject
CreateSolidBrush
shell32
SHGetSpecialFolderPathW
ole32
CoTaskMemFree
CoUninitialize
CoInitialize
StringFromCLSID
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
VariantInit
SysAllocString
LoadTypeLi
LoadRegTypeLi
SysStringLen
SysFreeString
DispCallFunc
atl80
ord31
ord40
ord48
ord47
ord42
ord11
ord10
ord44
ord43
ord17
ord58
ord30
ord61
ord23
ord32
ord64
ord22
ord18
ord20
exceptcatch
?SetExceptionCatcher@@YAXPB_W0H@Z
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE