c:\TeamViewer5_Release\TeamViewer\qs_release\TV.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c00b205c0100c368e5b3100662aa811b.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c00b205c0100c368e5b3100662aa811b.dll
Resource
win10v2004-20240226-en
General
-
Target
c00b205c0100c368e5b3100662aa811b
-
Size
64KB
-
MD5
c00b205c0100c368e5b3100662aa811b
-
SHA1
545e1f809e34afbf0dbf02989eb94351fef5b61b
-
SHA256
9d6378a18687d003b3cfc13090fd6969a89a5e85f3e782cd2e9cf8036e27910e
-
SHA512
6a58788930a173cd9e94aff13a1c57584aa09f9b7ef4f6cdf5f3b9c7b1324ffff88ca68117feddaba9e0161778bb1ccb65343d1d0ae90cc1ad82d290649eb134
-
SSDEEP
768:wW2rl8BIyvbqSBI6zhDsRpYD92RuSoxf9mYPzz4ajjZLq00RQz5jYjsl:0SB1ZXiRWD97f9dzzVH10OdUjsl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c00b205c0100c368e5b3100662aa811b
Files
-
c00b205c0100c368e5b3100662aa811b.dll windows:5 windows x86 arch:x86
a7f56d329eed42e05569d93e61484edf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntdll
NtSetContextThread
NtAllocateVirtualMemory
RtlMoveMemory
NtProtectVirtualMemory
NtFreeVirtualMemory
RtlComputeCrc32
RtlDecompressBuffer
NtTerminateThread
NtSuspendThread
NtOpenThread
RtlGetVersion
NtQuerySystemInformation
NtQueryVirtualMemory
RtlCompareMemory
NtWriteVirtualMemory
NtFlushInstructionCache
RtlGetNtVersionNumbers
NtOpenProcess
RtlTimeToSecondsSince1970
NtGetContextThread
RtlRandom
NtResumeThread
NtTerminateProcess
NtCreateSection
NtMapViewOfSection
NtUnmapViewOfSection
NtClose
RtlZeroMemory
kernel32
lstrcmpiW
GetCommandLineW
LoadLibraryW
CreateProcessW
FindClose
FindNextFileW
DeleteFileW
lstrcatW
lstrcmpW
FindFirstFileW
lstrlenW
HeapReAlloc
lstrlenA
MultiByteToWideChar
CreatePipe
GetLastError
SetCurrentDirectoryW
GetExitCodeProcess
WaitForSingleObject
WritePrivateProfileStringW
GetPrivateProfileIntW
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceW
SetEvent
OpenEventA
WaitForMultipleObjects
ExpandEnvironmentStringsW
OpenEventW
GetSystemTimeAsFileTime
GetLocaleInfoW
CreateEventA
lstrcmpiA
SetLastError
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetComputerNameExW
WTSGetActiveConsoleSessionId
GetSystemDirectoryW
GetModuleHandleW
DisableThreadLibraryCalls
FormatMessageW
LoadLibraryExW
GetVolumeInformationW
InterlockedCompareExchange
InterlockedExchange
HeapCreate
HeapDestroy
GetModuleHandleA
LocalFree
FreeLibrary
LoadLibraryA
GetProcAddress
GetTickCount
CreateEventW
CreateThread
Sleep
ExitProcess
lstrcpyA
GetFileSize
VirtualAlloc
GetPrivateProfileStringW
VirtualFree
CreateFileW
GetFileAttributesW
MoveFileExW
SetFilePointer
CloseHandle
WriteFile
ReadFile
HeapFree
GetProcessHeap
HeapAlloc
CreateFileA
WideCharToMultiByte
user32
MessageBoxW
SetWindowPos
BringWindowToTop
SetForegroundWindow
SendMessageW
GetThreadDesktop
CreateDesktopW
CloseDesktop
SwitchDesktop
SetThreadDesktop
LoadStringW
GetClassNameW
DestroyWindow
CreateDialogIndirectParamW
SetWindowTextW
GetWindowLongW
SetWindowLongW
PostQuitMessage
CallWindowProcW
SetTimer
GetMessageW
KillTimer
GetForegroundWindow
GetWindowTextW
GetWindowThreadProcessId
GetDlgItemTextA
DispatchMessageW
GetDesktopWindow
GetDC
GetWindowRect
GetIconInfo
DrawIconEx
ReleaseDC
CharLowerW
GetDlgItem
ExitWindowsEx
PostThreadMessageW
wsprintfA
IsWindow
PostMessageW
wsprintfW
GetCursorInfo
shlwapi
PathGetDriveNumberW
PathBuildRootW
StrToIntW
PathFindFileNameW
StrCmpNIW
StrCmpNIA
StrTrimA
ord12
PathIsRelativeW
PathQuoteSpacesW
StrRChrW
StrDupA
StrChrA
PathRemoveFileSpecA
PathAddBackslashA
PathFindFileNameA
StrChrW
PathRemoveFileSpecW
PathAddBackslashW
wtsapi32
WTSEnumerateSessionsW
WTSQuerySessionInformationW
WTSFreeMemory
WTSQueryUserToken
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
advapi32
RegDeleteKeyW
QueryServiceStatusEx
RegQueryValueExW
SetNamedSecurityInfoW
SetSecurityInfo
SetEntriesInAclW
CreateWellKnownSid
GetNamedSecurityInfoW
GetSecurityInfo
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
DuplicateToken
GetTokenInformation
OpenProcessToken
ConvertSidToStringSidW
EqualSid
DuplicateTokenEx
CreateProcessAsUserW
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceW
OpenSCManagerW
StartServiceW
ChangeServiceConfigW
QueryServiceConfigW
SetServiceStatus
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
LogonUserW
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CreateServiceW
ChangeServiceConfig2W
RegisterServiceCtrlHandlerExW
wininet
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestExW
InternetOpenW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetWriteFile
InternetOpenUrlW
HttpEndRequestW
shell32
SHCreateDirectoryExW
CommandLineToArgvW
ShellExecuteExW
SHFileOperationW
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
gdi32
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectW
DeleteObject
DeleteDC
CreateCompatibleDC
cabinet
ord21
ord22
ord23
ord20
oleaut32
SysAllocStringLen
VariantInit
SysFreeString
SysAllocString
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
Exports
Exports
SetSvc
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ