C:\workspace\qb_driver_service\master\out\Release\QQUrlMgr_QQ88.pdb
Static task
static1
Behavioral task
behavioral1
Sample
607e13b299f70bc67641c71c088e06068bcc9046dae5a87183ff12ca688dccb0.exe
Resource
win7-20240215-en
General
-
Target
607e13b299f70bc67641c71c088e06068bcc9046dae5a87183ff12ca688dccb0
-
Size
476KB
-
MD5
c4db30adeab68a1215ca5f3060bde0e8
-
SHA1
4faf4689ceba4e3f8cf4d4291b3c06c4df41aa12
-
SHA256
607e13b299f70bc67641c71c088e06068bcc9046dae5a87183ff12ca688dccb0
-
SHA512
1f9f9558b002546c11c0b9ce01733c533a3a0dafc00554f2e1ff80c08bad0e747a2160d7f73d6f0fd17f5a9e0b7b4411b5f1e90ad7c2775ed0c3305cba045d84
-
SSDEEP
12288:rBVN4UPAYNj9hGKEzh0dljiZNMJCpqwt/pfkXRqD:rBVN4/YNj9hGz2Tu7MgpqwL8XUD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 607e13b299f70bc67641c71c088e06068bcc9046dae5a87183ff12ca688dccb0
Files
-
607e13b299f70bc67641c71c088e06068bcc9046dae5a87183ff12ca688dccb0.exe windows:5 windows x86 arch:x86
1278ac8aa364e9d4e87aaa3f1324c3e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
GetModuleInformation
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
SetErrorMode
GetProcAddress
InitializeCriticalSection
WriteProcessMemory
SetUnhandledExceptionFilter
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
EnterCriticalSection
CreateEventW
DuplicateHandle
SearchPathW
CreateProcessW
WaitForMultipleObjects
TerminateProcess
ReadProcessMemory
VirtualAllocEx
GetVersionExW
GetSystemDefaultLangID
GetSystemInfo
CreateThread
TerminateThread
GetSystemTimeAsFileTime
InterlockedCompareExchange
MultiByteToWideChar
DeviceIoControl
GetLastError
GetSystemDirectoryW
LoadLibraryW
FreeLibrary
GetFileSize
ReadFile
WaitForSingleObject
CopyFileW
FindFirstFileW
FindClose
WideCharToMultiByte
LocalFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleExW
CreateProcessA
ResumeThread
GetThreadContext
SetThreadContext
GetCurrentThread
GetModuleFileNameW
VirtualAlloc
VirtualProtect
SetLastError
GetModuleHandleA
GetPrivateProfileIntA
SetFilePointer
GetTickCount
GlobalFindAtomW
GlobalAddAtomW
GetExitCodeThread
GetPrivateProfileStringW
Process32FirstW
Process32NextW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
OpenEventW
SetEvent
LoadLibraryExW
RaiseException
DecodePointer
MoveFileExW
FindNextFileW
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
DisconnectNamedPipe
GetLocalTime
GetFileAttributesW
FindFirstFileA
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreatePipe
CreateDirectoryW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
CloseHandle
Sleep
WriteFile
CreateFileW
SetFileAttributesW
DeleteFileW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
FlushInstructionCache
SetEnvironmentVariableA
RtlUnwind
GetCommandLineW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeW
FindFirstFileExW
IsProcessorFeaturePresent
GetStringTypeW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
ExitProcess
QueryPerformanceCounter
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetTimeZoneInformation
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
EnumSystemLocalesW
user32
KillTimer
PostQuitMessage
TranslateMessage
SetTimer
PostThreadMessageW
GetMessageW
PeekMessageW
IsWindow
FindWindowW
SendMessageTimeoutW
advapi32
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueA
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFolderPathA
ole32
CoInitialize
CoCreateGuid
CoUninitialize
shlwapi
PathFileExistsW
PathFindFileNameW
PathFileExistsA
wnsprintfA
wnsprintfW
SHGetValueA
wininet
HttpSendRequestA
HttpOpenRequestW
InternetConnectW
InternetSetOptionW
InternetOpenA
InternetCloseHandle
ws2_32
htonl
htons
netapi32
Netbios
NetWkstaTransportEnum
NetApiBufferFree
urlmon
URLDownloadToFileW
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 85KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE