G:\2345chrome\trunk\dllplugin\Qingniao_dll\InstallerTool\bin\Win32\Release\pdb\FileInfo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78.dll
Resource
win10v2004-20231215-en
General
-
Target
f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78
-
Size
4.6MB
-
MD5
d0133ee27234a9456ab0299087f7916f
-
SHA1
5d4d26f7614ab4de04962754cb04d71587b45734
-
SHA256
f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78
-
SHA512
ff38bf847520c3a66fab5fe23471dbf82bc209bb67f5867d81e019f8e7f97db8ccd083f7380a774523a4ff6dcf25984496b3735b2dc743c44391358c78dc37cf
-
SSDEEP
98304:vDSmUF8orhG8C5qNddE+Qu7mwEIvd/uNcOKLMPwO7qa21svhjWv:2mUF8r5qzdTh3VUWpUFo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78
Files
-
f13eede08da2c266b9ba9584e3ad5cf7b623ed96e1d7f2be3cf29d9951369a78.dll windows:5 windows x86 arch:x86
83f36c578df81adee0e934e4dd12d58f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
WritePrivateProfileStringW
lstrcpynW
TerminateProcess
GetModuleFileNameW
GetProcessId
WaitForSingleObject
GetFileAttributesW
OpenProcess
SetFileAttributesW
Sleep
CloseHandle
LoadLibraryW
GetProcAddress
MoveFileExW
GlobalMemoryStatusEx
FreeLibrary
GetDriveTypeW
lstrlenW
GetShortPathNameW
lstrcmpiW
GetPrivateProfileStringW
GetTickCount
SizeofResource
FreeResource
LockResource
LoadResource
FindResourceW
GetCurrentProcessId
MultiByteToWideChar
GlobalAlloc
GlobalFree
WideCharToMultiByte
lstrcpyW
GetCommandLineW
LocalFree
WriteFile
SetFilePointer
CreateFileW
GetFileSize
RemoveDirectoryW
MoveFileWithProgressW
CopyFileExW
GetVersionExW
GetSystemInfo
GetModuleHandleW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
GetCurrentProcess
WaitForMultipleObjects
GetACP
DeleteFileW
GetExitCodeProcess
ReadFile
SetFileTime
SetEndOfFile
GetFileTime
GetCurrentThreadId
SuspendThread
GetExitCodeThread
TerminateThread
SwitchToThread
OpenThread
ResumeThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
FindNextFileW
FindClose
HeapFree
HeapAlloc
GetProcessHeap
CreateDirectoryW
GetFullPathNameW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
MoveFileW
FormatMessageW
CreateEventW
SetEvent
ResetEvent
InterlockedExchangeAdd
ExpandEnvironmentStringsW
GetEnvironmentVariableW
LoadLibraryExW
InterlockedExchange
SetLastError
FileTimeToSystemTime
InterlockedDecrement
GetConsoleMode
GetFileSizeEx
ReleaseMutex
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeviceIoControl
ReadConsoleW
GetStdHandle
CreateProcessW
SetFilePointerEx
CreateMutexW
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapSize
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
ExitThread
CreateThread
IsValidLocale
GetConsoleCP
IsDebuggerPresent
OutputDebugStringW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
HeapCreate
VirtualProtect
InterlockedCompareExchange
Thread32Next
Thread32First
CreateToolhelp32Snapshot
HeapReAlloc
HeapDestroy
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualFree
VirtualAlloc
VirtualQuery
RtlUnwind
InterlockedFlushSList
GetFileType
user32
wsprintfW
advapi32
GetUserNameW
AdjustTokenPrivileges
DuplicateTokenEx
shell32
SHGetFolderPathW
ord190
ord155
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHGetSpecialFolderPathW
ole32
CoInitialize
PropVariantClear
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
oleaut32
VariantChangeType
SysFreeString
VariantInit
VariantClear
SysAllocString
shlwapi
StrStrIW
StrCmpW
SHStrDupW
StrCatW
PathAppendW
PathRemoveFileSpecW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
Exports
Exports
CheckCrcAndGetValue
CheckFiles
CheckInstallTime
CheckParentProcess
CheckSystemConfiguration
CleanAnimateMark
ClearAudioReg
CopyImportantFileWithTransaction
CreateDownloadFolder
CreateLowIntegrityProcess
CreateReleaseFileProcessTmpFile
CreateScheduledTask
DeleteCustomQingniaoChromeTargetShortCut
DeleteInstallFile
DeleteQingniaoChromeTargetShortCut
DeleteScheduledTask
EncodeJifenID
EncodeRecommendPcsafeUnionCustom
EncodeUnion
FindProc
FindProcQingniaoChrome
FindSubstring
FixSoftware
FixSoftwareAfterRecommendPCSafe
GetCurrentSystemTime
GetDownloadSafecenterCloudConfig
GetInstallSafecenterCloudConfig
GetJifenInstallerParams
GetJifenUnionNameInstallerParams
GetParentProcessName
GetQingniaoChromePath
GetUnionCustomInstallerParams
GetUnionNameInstallerParams
GetValueWithCrcCode
ImpersonateUser
Init
InitInstallStatusStatistic
InitStatService
InitializeRecommendPCSafe
Install2345MgrDLL
InstallPCSafe
InstallRecommendPCSafeDll
InstallShield
IsWin10OrLater
KillProc
KillProcQingniaoChrome
KillProcessByPathAndName
KillProcessByPid
MergeMaskString
MyMoveFile
PinToStartMenu
PinToTaskBar
PreProcessShortCut
RevertUser
SendInstallFeatureStat
SendOverwriteFeatureStat
SendStatInfo
SendUninstallFeatureStat
SendUpgradeFeatureStat
SetInstallStep
SetUserOperation
ShieldUnlock
StartCloudConfigRequest
StartInstallServiceProcess
StartPreReleaseFileProcess
StopShield
TerminateCloudConfigRequest
UnInstallSafeCenter
UninitInstallStatusStatistic
UninitStatService
UninitializeRecommendPCSafe
Uninstall2345MgrDLL
UninstallShield
UnpinFromStartMenu
UnpinFromTaskBar
WaitForReleaseFileProcess
WriteInstallData
WriteLog
Sections
.text Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ