C:\workspace\qb10frame_release\chrome\src\out\Release_x86\TXBugReport.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
81cf5060fc39ab997a97affe502dcb96da77b87ca246b7a596d9ff58afa494ed.exe
Resource
win7-20240221-en
General
-
Target
81cf5060fc39ab997a97affe502dcb96da77b87ca246b7a596d9ff58afa494ed
-
Size
1.9MB
-
MD5
8467742f1902b54f5631923e09f49c7b
-
SHA1
a471a8cd28bd9ae756225711bcf9fd8ce1728472
-
SHA256
81cf5060fc39ab997a97affe502dcb96da77b87ca246b7a596d9ff58afa494ed
-
SHA512
86a06e83493a6b46217b7adb2e5626dc7d88ee569d6a460dccbe21e9b2574b1bf46d19c3ac6e5fd5699c6df68eb5869a6e5ae7c56615392ed91457531324f90d
-
SSDEEP
24576:0YJfcYVJ82lzlCW5mfLbIT94IMceJVN24ejs:0ohMW5mnITKIMHJ/24
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81cf5060fc39ab997a97affe502dcb96da77b87ca246b7a596d9ff58afa494ed
Files
-
81cf5060fc39ab997a97affe502dcb96da77b87ca246b7a596d9ff58afa494ed.exe windows:5 windows x86 arch:x86
d444bbe1560839ae1dd4e2360349be12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
dbghelp
SymSetOptions
SymGetModuleInfoW
SymInitialize
SymLoadModule
SymCleanup
wininet
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
psapi
GetModuleFileNameExW
GetModuleFileNameExA
comctl32
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
kernel32
HeapSize
CreateToolhelp32Snapshot
CreateEventW
GetLastError
LockResource
HeapReAlloc
CloseHandle
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
VirtualAllocEx
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
GetTickCount
OpenThread
SetUnhandledExceptionFilter
VirtualProtect
SetCurrentDirectoryW
lstrlenW
FindClose
WaitForSingleObject
OpenEventW
OpenProcess
MultiByteToWideChar
CreateFileA
SetEvent
lstrcatW
DeleteFileW
LoadLibraryW
CreateThread
GetLocalTime
GetWindowsDirectoryW
FreeLibrary
CopyFileW
WideCharToMultiByte
IsBadReadPtr
VirtualQueryEx
InterlockedDecrement
Sleep
GlobalAlloc
GlobalFree
IsDBCSLeadByte
GlobalLock
lstrcpyW
InterlockedIncrement
GlobalUnlock
FindFirstFileW
FindNextFileW
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ResumeThread
FreeResource
GetFileAttributesW
GetFileSize
Process32NextW
Process32FirstW
GetCurrentThreadId
CreateDirectoryW
ReadFile
WritePrivateProfileStringW
GetSystemDefaultLCID
GetPrivateProfileIntW
SetFilePointer
GetTempPathW
GetPrivateProfileSectionW
GetThreadSelectorEntry
VirtualFree
VirtualAlloc
SetFileAttributesW
GetSystemTimeAsFileTime
QueryPerformanceCounter
MoveFileW
GetProcessTimes
DeviceIoControl
TerminateThread
SetLastError
GetSystemDefaultLangID
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
LocalFree
OutputDebugStringW
GetSystemDirectoryW
GetSystemInfo
GetFullPathNameW
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FlushFileBuffers
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
LoadLibraryExW
SetFilePointerEx
GetFileType
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
ExitProcess
GetStdHandle
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
CreateFileW
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
HeapFree
WriteProcessMemory
SizeofResource
InitOnceExecuteOnce
GetVersionExW
SetStdHandle
SetEndOfFile
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentDirectoryW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
WriteFile
user32
SetWindowLongW
KillTimer
GetSysColorBrush
EnableMenuItem
DialogBoxParamW
IsWindow
TrackPopupMenu
CreatePopupMenu
GetClassInfoExW
RegisterClassExW
CreateWindowExW
DestroyWindow
DefWindowProcW
MapDialogRect
SetClipboardData
SendDlgItemMessageW
DestroyMenu
MapWindowPoints
SetDlgItemTextW
EmptyClipboard
CloseClipboard
ClientToScreen
SetTimer
OpenClipboard
GetMenuItemCount
GetDC
GetMenuItemID
GetWindowRect
CallWindowProcW
GetKeyState
GetSystemMenu
RegisterClipboardFormatW
GetWindowTextLengthW
ReleaseDC
GetGuiResources
DrawTextW
InvalidateRect
BeginPaint
EndPaint
EnableWindow
GetWindowLongW
GetWindowThreadProcessId
PostMessageW
EnumChildWindows
EnumWindows
GetClassNameW
GetDesktopWindow
GetWindowTextW
MessageBoxW
SendMessageW
EndDialog
SetWindowTextW
ShowWindow
LoadIconW
GetClientRect
GetDlgItem
DrawIconEx
LoadImageW
SetWindowPos
gdi32
SetBkMode
SetTextColor
GetStockObject
CreateFontW
SelectObject
DeleteObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
ConvertSidToStringSidW
OpenProcessToken
GetTokenInformation
shell32
SHGetDesktopFolder
SHBindToParent
ord155
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ole32
OleInitialize
DoDragDrop
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateGuid
OleUninitialize
oleaut32
SysFreeString
SysAllocStringByteLen
SysAllocString
SysStringByteLen
SysStringLen
shlwapi
StrRStrIA
PathFindFileNameA
StrTrimA
PathRemoveExtensionA
PathCombineW
PathFindExtensionW
SHGetValueA
PathRemoveExtensionW
PathFindFileNameW
PathAppendW
PathFileExistsW
SHGetValueW
gdiplus
GdipFree
GdipGetPropertyItem
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipGetImageWidth
GdipDeleteGraphics
GdipCreateFromHDC
GdipImageGetFrameDimensionsCount
GdipDisposeImage
GdipDrawImageRectI
GdipCloneImage
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipLoadImageFromStreamICM
GdipGetImageHeight
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
ws2_32
htons
htonl
dbgeng
DebugCreate
crypt32
CertGetNameStringW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
netapi32
NetWkstaTransportEnum
NetApiBufferFree
Netbios
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
Sections
.text Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE