D:\devops\workspace\p-37d34ce895ed4865ac95061b653d796f\Misc\Setup3\build\Release\QQSetupEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06.exe
Resource
win10v2004-20240226-en
General
-
Target
7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06
-
Size
571KB
-
MD5
769650d5b9d8da8bcb9d401badf6193f
-
SHA1
e24650833061c283a4034813bec1ff0013bf7752
-
SHA256
7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06
-
SHA512
bfa4c16d20fbbdc2449dc2beb591aaa5c425e1afe7a2020f392bc9b17c4917c6a5ab5bab28d36783059437871d6d4e10ca9fa8ebc815a23bfe6a0a75c0b965d5
-
SSDEEP
12288:jPYvxCP/iSdN1D2eMFvH/KNJDiaVe9891oN7Jv0GynIqbDLQ9D7310iPf9j7938z:jP/bxJS7JsnIuc10iH9j7Nq3+IA7LVS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06
Files
-
7856354e0f3cb87151dd2a680134b39606bc8ad36ebac989f55cf9c27696ac06.exe windows:5 windows x86 arch:x86
9269de9c1b684a193ff42c3fe49da4a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ntohl
htons
recv
inet_ntoa
connect
socket
send
inet_addr
WSAStartup
gethostbyname
closesocket
WSACleanup
htonl
netapi32
Netbios
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
InternetQueryOptionW
InternetReadFile
InternetOpenUrlW
InternetOpenW
HttpQueryInfoW
InternetCloseHandle
InternetGetConnectedState
arkhttpclient
arkHTTPShutdown
arkHTTPSetLogCallback
arkHTTPSendRequest
arkHTTPQueryInfo
arkHTTPClose
arkHTTPSetOption
arkHTTPOpen
arkHTTPStartup
arkHTTPCancelRequest
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpGetProxyForUrl
kernel32
CompareStringW
GetACP
ExitProcess
GetConsoleCP
SetFilePointerEx
SetStdHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
LoadLibraryExW
EncodePointer
RtlUnwind
OutputDebugStringW
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
CreateDirectoryW
GetLongPathNameW
GetTempPathW
GetFileAttributesW
DeleteFileW
ReadFile
WriteFile
SetFilePointer
CreateFileW
GetLastError
CloseHandle
GetFileSize
GetVersionExW
SizeofResource
HeapFree
GetCommandLineW
InitializeCriticalSectionAndSpinCount
CreateMutexW
WaitForSingleObject
GetCurrentThreadId
HeapSize
LockResource
HeapReAlloc
RaiseException
CreateThread
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetLocalTime
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
QueryPerformanceCounter
GetTickCount
OpenThread
GetCurrentProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetCurrentProcessId
lstrcmpiW
OpenMutexW
MoveFileW
GetExitCodeProcess
ExpandEnvironmentStringsW
WaitForMultipleObjects
GetModuleHandleA
CreateEventW
MultiByteToWideChar
LoadLibraryW
GetCurrentDirectoryW
FreeLibrary
DeviceIoControl
InterlockedExchange
FindFirstFileW
InterlockedCompareExchange
FindClose
SwitchToThread
CopyFileW
MoveFileExW
WideCharToMultiByte
GetModuleFileNameW
GetSystemDirectoryW
FreeResource
GetFileSizeEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
SetFileAttributesW
Sleep
LoadLibraryA
QueryPerformanceFrequency
GetSystemTimeAsFileTime
VirtualQuery
GetProcessTimes
GetStdHandle
CreatePipe
DuplicateHandle
CreateProcessW
GlobalAddAtomW
SetEvent
SetErrorMode
GetWindowsDirectoryW
GetVersion
GlobalAlloc
GlobalFree
OpenProcess
lstrcmpW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenA
lstrlenW
GetTempFileNameW
RemoveDirectoryW
FindNextFileW
GetShortPathNameW
MulDiv
GetPrivateProfileStringW
WritePrivateProfileStringW
SetCurrentDirectoryW
GetFullPathNameW
SearchPathW
ResetEvent
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
TlsSetValue
ReleaseSemaphore
TlsAlloc
TlsGetValue
TlsFree
CreateSemaphoreA
SetLastError
PeekNamedPipe
FlushFileBuffers
SetEndOfFile
GetConsoleMode
ReadConsoleW
WriteConsoleW
GetFileType
FileTimeToSystemTime
TerminateProcess
LCMapStringW
GetStartupInfoW
UnhandledExceptionFilter
GetStringTypeW
WaitForSingleObjectEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetTimeZoneInformation
user32
CreateWindowExW
SendMessageW
RegisterClassExW
ShowWindow
IsWindow
GetDesktopWindow
GetClassInfoExW
LoadMenuW
PostMessageW
TrackPopupMenu
GetSubMenu
DestroyMenu
SetForegroundWindow
GetCursorPos
DestroyWindow
DispatchMessageW
PeekMessageW
wsprintfW
wvsprintfW
GetWindowLongW
SetTimer
RegisterClassW
SetWindowLongW
KillTimer
LoadImageW
UpdateWindow
SendMessageTimeoutW
CharUpperW
UnregisterClassW
DefWindowProcW
SetWindowTextW
MessageBoxIndirectW
CharPrevW
CharNextW
GetMessageW
FindWindowW
PostThreadMessageW
TranslateMessage
gdi32
GetStockObject
advapi32
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegCreateKeyW
RegEnumKeyW
RegEnumValueW
shell32
Shell_NotifyIconW
SHGetFolderPathW
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
CommandLineToArgvW
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
ole32
CoTaskMemFree
CoUninitialize
CoCreateGuid
CoInitialize
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFindFileNameW
PathFileExistsW
StrChrIA
PathIsDirectoryW
wintrust
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
CryptCATAdminReleaseCatalogContext
WTHelperGetProvCertFromChain
WinVerifyTrust
CryptCATAdminAcquireContext
crypt32
CertGetNameStringW
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.QMGuid Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 560KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE