C:\workspace\qb10frame_release\chrome\src\out\Release_x86\BugReport.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a18025f0c93cb13318e9338ecdfcb5e327240d95054e309a9a6627f39136baf1.exe
Resource
win7-20240221-en
General
-
Target
a18025f0c93cb13318e9338ecdfcb5e327240d95054e309a9a6627f39136baf1
-
Size
3.9MB
-
MD5
adfbe9bf163641807f5e0d1f602f7761
-
SHA1
758b7adb810bdca19d8be0f99e907d0df884f189
-
SHA256
a18025f0c93cb13318e9338ecdfcb5e327240d95054e309a9a6627f39136baf1
-
SHA512
72ff53b15bc5c1497c860bac27aa29e6da3d4c06ce9151430cd4f22ef93f655015ab95b76ce28af682337176ae7d2d603dafea045c107273c679870e76d95a64
-
SSDEEP
24576:+V46KXw6GFg0Rr8YMTy5c3+aQ5mFkH/4:y4DJ0inTy5c3b1F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a18025f0c93cb13318e9338ecdfcb5e327240d95054e309a9a6627f39136baf1
Files
-
a18025f0c93cb13318e9338ecdfcb5e327240d95054e309a9a6627f39136baf1.exe windows:5 windows x86 arch:x86
40990786341333ca8ca1d3452b2ea35c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ord17
wininet
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpSendRequestA
HttpOpenRequestW
InternetOpenA
InternetConnectW
InternetReadFile
InternetSetOptionW
dbghelp
SymGetModuleInfo
SymFunctionTableAccess
SymCleanup
SymSetOptions
StackWalk
SymInitialize
SymLoadModule
SymGetModuleInfoW
gdi32
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontW
kernel32
GetDriveTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
GetCommandLineA
WriteConsoleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
CreateDirectoryW
CreateFileW
GetFileSize
ReadFile
SetFilePointer
GetTempPathW
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
GetVersionExW
GetModuleHandleW
GetProcAddress
CreateFileA
DeleteFileW
FileTimeToLocalFileTime
FindClose
FindFirstFileW
FindNextFileW
WriteFile
GetProcessTimes
OpenThread
GetProcessId
GetProcessHandleCount
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
GetLocalTime
VirtualQueryEx
ReadProcessMemory
GetModuleFileNameW
LocalAlloc
LocalFree
lstrcpynW
FileTimeToSystemTime
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
SetCurrentDirectoryW
HeapAlloc
HeapFree
GetProcessHeap
SetEvent
WaitForSingleObject
CreateProcessW
OpenProcess
VirtualProtect
SetDllDirectoryW
GetFileAttributesW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
CreatePipe
Sleep
GetCurrentProcess
CreateThread
LoadLibraryW
MoveFileW
WideCharToMultiByte
GetFileInformationByHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InitOnceExecuteOnce
HeapDestroy
HeapReAlloc
HeapSize
FreeLibrary
ExpandEnvironmentStringsW
DeviceIoControl
GetSystemDirectoryW
GetPrivateProfileStringW
MultiByteToWideChar
GetFullPathNameW
RemoveDirectoryW
lstrcmpiW
GetSystemInfo
HeapCreate
GetModuleHandleA
CreateEventW
GetNativeSystemInfo
GetCurrentDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetWindowsDirectoryW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
QueryPerformanceFrequency
QueryPerformanceCounter
FindFirstFileExW
IsDebuggerPresent
GetCommandLineW
SetEnvironmentVariableW
GetEnvironmentVariableW
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
TerminateProcess
GetModuleHandleExW
VirtualQuery
ResetEvent
LoadLibraryExA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
OutputDebugStringW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
LeaveCriticalSection
EnterCriticalSection
oleaut32
VariantInit
VariantClear
SysAllocString
psapi
GetProcessMemoryInfo
GetModuleFileNameExA
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
SHGetFolderPathW
shlwapi
PathFileExistsW
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveBackslashW
PathRemoveFileSpecW
PathCombineW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ws2_32
htons
ntohl
ntohs
htonl
rpcrt4
RpcStringFreeW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingFree
NdrClientCall2
netapi32
NetApiBufferFree
Netbios
NetWkstaTransportEnum
Exports
Exports
GetHandleVerifier
Sections
.text Size: 369KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE