D:\devops\workspace\p-37d34ce895ed4865ac95061b653d796f\Output\BinFinal\QQ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a.exe
Resource
win10v2004-20240412-en
General
-
Target
90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a
-
Size
141KB
-
MD5
65ea657a5f29f624c1808b9942ccab15
-
SHA1
b45fa15dd9bb90f48cafd07deeb2d3a0a89b3ff7
-
SHA256
90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a
-
SHA512
ad47d6808167e22716301b788952e5bc691c62edfbeb15c1a05b42ea5a14fdb351826ea8ca1b5a5a259f052fd40f0198fa53a223628167bd448b0f080ee7df9e
-
SSDEEP
1536:ogfyUSh7SukSaErDY1Tpe3vaYtBDWFInc6L4N1whvFzOyWOOOMnxJ+7xnBjAnXfW:Gh7yG/YTeNTDbcjehv8VNnXMxMXfkJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a
Files
-
90ad19500c1878eefbbba5012c9876d9c763921fd950fd34471d95be45e6be6a.exe windows:5 windows x86 arch:x86
7b4410e41e5d46ed1210e36910a8071a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
firstload
FirstLoad
libtcmalloc
_tcmalloc
libuv
uv_loop_init
kernel32
GetModuleFileNameW
MapViewOfFile
UnmapViewOfFile
GetProcAddress
GetModuleHandleW
GetCurrentProcess
LoadLibraryW
FreeLibrary
RaiseException
GetVersionExW
HeapCreate
GetLastError
CreateEventW
HeapDestroy
SetLastError
CreateFileMappingW
ReadFileEx
WaitForSingleObjectEx
VirtualUnlock
SetCurrentDirectoryA
LoadLibraryExA
SetProcessWorkingSetSize
DeviceIoControl
SetEvent
HeapAlloc
HeapFree
GetTickCount
LoadLibraryExW
OutputDebugStringW
GetSystemInfo
SetProcessAffinityMask
GetCommandLineW
DeleteCriticalSection
DecodePointer
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateFileW
CloseHandle
GetFileSize
CreateFileA
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualLock
IsDebuggerPresent
InitializeSListHead
user32
PostThreadMessageW
advapi32
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceEnableLevel
ole32
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateInstance
OleInitialize
shlwapi
PathCombineW
PathCombineA
msvcp140
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
_except_handler4_common
__std_exception_copy
memmove
_CxxThrowException
memcpy
memset
__std_exception_destroy
api-ms-win-crt-string-l1-1-0
wcsncpy
wcscpy_s
wcscmp
wcslen
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
_controlfp_s
terminate
_register_onexit_function
_crt_atexit
_cexit
_register_thread_local_exe_atexit_callback
_c_exit
_seh_filter_exe
_set_app_type
_exit
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsnwprintf_s
__stdio_common_vswprintf
_set_fmode
__stdio_common_vsprintf
__p__commode
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
_callnewh
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE