Static task
static1
Behavioral task
behavioral1
Sample
f2c4c9113db748c7f500001191f46e775c690017a46c9e302e68b687ec7ceeef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2c4c9113db748c7f500001191f46e775c690017a46c9e302e68b687ec7ceeef.exe
Resource
win10v2004-20220812-en
General
-
Target
f2c4c9113db748c7f500001191f46e775c690017a46c9e302e68b687ec7ceeef
-
Size
541KB
-
MD5
77bbee917209fa652f8273c24670170d
-
SHA1
6507ec52c7f348b631b74e956c402adb00e6fa55
-
SHA256
f2c4c9113db748c7f500001191f46e775c690017a46c9e302e68b687ec7ceeef
-
SHA512
1f1ef8a829a05f63c60f12e78d42bc33bae415db89623c6859de1168c0f4351b6be93ec6dc192827a56cbf194b8202307f97ff82a6f597a5af41b73ab2499e38
-
SSDEEP
6144:jeaKR7k2/vbi+MTgiisIyQlNadAI6ZaeqHxvT3Jk8HqE9jvadgeil05xL6JPOWA+:jo7RNMTgiisIXradN2a7HxP1y6SpQ1T
Malware Config
Signatures
Files
-
f2c4c9113db748c7f500001191f46e775c690017a46c9e302e68b687ec7ceeef.exe windows x86
5eba8e63267eaa3a3b940de5c7ef4c56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetSetOptionA
HttpQueryInfoA
InternetErrorDlg
InternetCloseHandle
InternetQueryOptionA
iphlpapi
GetAdaptersInfo
GetNetworkParams
rpcrt4
UuidFromStringA
rasdlg
RasDialDlgA
rasapi32
RasEnumEntriesA
basicctrldll
??0CAsyncGetHostByName@@QAE@PAUHWND__@@IVCString@@HH@Z
??0CTimerEvent@@QAE@XZ
?GetLocalIP@@YA?AVCString@@PAKH@Z
?SetEnabled@CTimerEvent@@QAEXH@Z
?GetInstallFolder@@YA?AVCString@@XZ
?CheckFileExist1@@YAHVCString@@@Z
?GetQQStorePath@@YAAAVCString@@AAV1@W4_emQQPath@@@Z
?GetCurrentUin@@YAKPAUIQQCore@@@Z
?GetQQStorePath@@YAAAVCString@@AAV1@V1@W4_emQQPath@@@Z
?CreateQQData@@YAXPAPAUIQQData@@@Z
?GetQQDataStr@@YAJPAUIQQData@@PBDAAVCString@@@Z
?GetExeFolder@@YA?AVCString@@XZ
?GetQQStorePath@@YAAAVCString@@AAV1@W4_emQQPath@@K@Z
?GetCurrentUserData@@YAXPAUIQQCore@@PAPAUIQQData@@@Z
?InitBugReport@@YAHVCString@@0000HHKKKHHH00@Z
?CreateQQDataArray@@YAXPAPAUIQQDataArray@@@Z
?OnProgressEx@CHttpDownloadUIInterface@@UAEXKKPBD@Z
?OnError@CHttpDownloadUIInterface@@UAEXK@Z
?OnRedirected@CHttpDownloadUIInterface@@UAEXPBD@Z
?OnProgress@CHttpDownloadUIInterface@@UAEXKK@Z
?OnDownloadStart@CHttpDownloadUIInterface@@UAEXKK@Z
?OnConnected@CHttpDownloadUIInterface@@UAEXXZ
?OnConnecting@CHttpDownloadUIInterface@@UAEXPBD@Z
??1CHttpDownload@@UAE@XZ
??1CHttpDownloadUIInterface@@UAE@XZ
??0CHttpDownload@@QAE@XZ
??0CHttpDownloadUIInterface@@IAE@XZ
?CancelDownload@CHttpDownload@@QAEXXZ
?Download@CHttpDownload@@QAEIPBD0PAU_SYSTEMTIME@@@Z
?SetAutoResume@CHttpDownload@@QAEXH@Z
?SetUseIEProxy@CHttpDownload@@QAEXH@Z
?SetUIInterface@CHttpDownload@@QAEXPAVCHttpDownloadUIInterface@@@Z
??1CCsSendSinkHelper@@UAE@XZ
??0CCsSendSinkHelper@@QAE@XZ
?NextQQDataArrayStr@@YAJPAUIQQDataArray@@AAVCString@@@Z
?ConvertGBKToUtf8@@YAXAAVCString@@@Z
?BIG2GB@@YAXAAVCString@@@Z
?ConvertUtf8ToGBK@@YAXAAVCString@@@Z
?GB2BIG@@YAXAAVCString@@@Z
?BIG_GB@@YAHPAEH@Z
?CopyAFieldQQData@@YAJPAUIQQData@@0VCString@@1E@Z
?GetQQDataBuf@@YAJPAUIQQData@@PBDAAVCString@@@Z
?SetInterval@CTimerEvent@@QAEXI@Z
?Base64Encode@@YA?AVCString@@PBDH@Z
?IsMySelfInLan@@YAHK@Z
?GetCurrentSysTempData@@YAXPAUIQQCore@@PAPAUIQQData@@@Z
?BasicLoadStr@@YAXAAVCString@@I@Z
?PSWEncrypt@@YA?AVCString@@PAEH@Z
?PSWDecrypt@@YA?AVCString@@V1@@Z
??1CTimerEvent@@UAE@XZ
?GetCurrentUin@@YAHPAUIQQCore@@PAK@Z
?GetQQFileCacheFolder@@YA?AVCString@@XZ
?GetQQGlobalDb@@YA?AVCString@@XZ
?AsynGetHostByName@CAsyncGetHostByName@@QAEXVCString@@@Z
??0CAsyncGetHostByName@@QAE@XZ
?NextQQDataArrayBuf@@YAJPAUIQQDataArray@@AAVCString@@@Z
?BUFFER2String@@YA?AVCString@@PBDH@Z
?GetEnabled@CTimerEvent@@QAEHXZ
mfc42
ord5186
ord354
ord4278
ord941
ord4003
ord2727
ord6467
ord2730
ord2729
ord3742
ord2152
ord1233
ord2827
ord4129
ord5683
ord1114
ord1228
ord1113
ord3258
ord6215
ord4299
ord2086
ord6880
ord3092
ord2379
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord5307
ord5714
ord4622
ord3738
ord2625
ord6438
ord1199
ord1247
ord5710
ord6662
ord2763
ord1799
ord3353
ord614
ord290
ord4226
ord1265
ord2233
ord2575
ord4396
ord3574
ord609
ord1146
ord755
ord470
ord5981
ord2645
ord4224
ord3698
ord765
ord3579
ord4277
ord446
ord743
ord538
ord6648
ord801
ord6883
ord541
ord6197
ord324
ord5278
ord3813
ord2860
ord6143
ord5861
ord940
ord818
ord5863
ord568
ord6311
ord4171
ord2033
ord3953
ord3401
ord5431
ord3348
ord4351
ord2989
ord619
ord297
ord2725
ord4698
ord5289
ord815
ord561
ord1601
ord2988
ord857
ord536
ord2393
ord1949
ord1572
ord6380
ord6442
ord6929
ord772
ord4021
ord5860
ord500
ord1889
ord6364
ord3326
ord6365
ord3318
ord6350
ord5498
ord4013
ord1262
ord5651
ord3127
ord3616
ord350
ord3126
ord3613
ord654
ord697
ord341
ord395
ord3981
ord5603
ord910
ord4186
ord6140
ord5591
ord6145
ord5611
ord2623
ord5858
ord702
ord400
ord4191
ord915
ord1083
ord1576
ord501
ord5634
ord5607
ord3441
ord5596
ord3584
ord803
ord543
ord1639
ord3780
ord2077
ord5809
ord2449
ord5480
ord2029
ord1638
ord1200
ord5810
ord5481
ord2031
ord4863
ord5796
ord5478
ord966
ord3570
ord605
ord278
ord4335
ord4411
ord4447
ord4919
ord4975
ord1971
ord1670
ord349
ord926
ord923
ord2764
ord6282
ord2784
ord4204
ord3500
ord703
ord603
ord1989
ord5445
ord1969
ord273
ord403
ord2801
ord5608
ord1578
ord600
ord826
ord269
ord795
ord3626
ord3573
ord3721
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord2915
ord5442
ord5572
ord1979
ord665
ord2614
ord3903
ord2107
ord2044
ord2448
ord2841
ord6383
ord5440
ord5834
ord6394
ord5450
ord823
ord3771
ord1154
ord2818
ord537
ord922
ord939
ord924
ord535
ord858
ord4275
ord781
ord3708
ord2864
ord5953
ord4234
ord4476
ord3089
ord540
ord1168
ord4160
ord860
ord6199
ord800
ord4710
ord1641
ord2302
ord641
ord3619
ord2414
ord825
ord4472
ord567
ord6055
ord3663
ord3597
ord4425
ord1775
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord1243
ord1176
ord2820
ord3811
ord819
ord2762
msvcrt
exit
_setmbcp
_acmdln
__getmainargs
_initterm
__setusermatherr
_XcptFilter
__p__commode
__CxxFrameHandler
_mbscmp
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
strstr
_beginthreadex
malloc
_adjust_fdiv
sscanf
memcpy
memset
_mbschr
_mbsncmp
strlen
_mbsstr
_snprintf
_mbsnbcmp
_mbsnbcpy
memmove
strncpy
printf
rand
srand
__p___argv
__p___argc
realloc
memcmp
atoi
_controlfp
free
_except_handler3
time
_CxxThrowException
strncat
_purecall
atol
kernel32
LocalAlloc
LocalFree
lstrlenW
WideCharToMultiByte
GetTempFileNameA
CreateDirectoryA
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
InterlockedDecrement
InterlockedIncrement
GetTempPathA
WritePrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
CopyFileA
DeleteFileA
GetModuleHandleA
lstrlenA
MultiByteToWideChar
GetCommandLineA
GetTickCount
GetProcessHeap
HeapAlloc
HeapFree
WinExec
FreeLibrary
LoadLibraryA
GetProcAddress
Sleep
GlobalAlloc
GlobalFree
GetCurrentProcessId
GetLastError
CreateThread
GetModuleFileNameA
CreateFileA
SetFilePointer
WriteFile
CloseHandle
GetSystemTime
GetCurrentThreadId
GetStartupInfoA
user32
SendMessageA
LoadImageA
PostMessageA
GetParent
RedrawWindow
KillTimer
SetTimer
GetWindowRect
GetClientRect
LoadIconA
GetSysColor
EnableWindow
DrawIcon
GetSystemMetrics
IsIconic
IsWindowVisible
IsWindow
GetDesktopWindow
UnregisterHotKey
gdi32
CreateSolidBrush
GetObjectA
CreateFontIndirectA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CoTaskMemFree
CoTaskMemAlloc
StgCreateDocfile
StgOpenStorage
CoLoadLibrary
CoInitialize
CoCreateGuid
oleaut32
VariantClear
msvcp60
??1_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
ws2_32
ioctlsocket
listen
getsockopt
WSAGetLastError
htonl
ntohl
ntohs
gethostbyname
WSAStartup
socket
setsockopt
inet_ntoa
htons
sendto
select
__WSAFDIsSet
recvfrom
inet_addr
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
SetupDiDestroyDeviceInfoList
Sections
.text Size: 332KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ