C:\workspace\qb_driver_service\master\out\Release\QQUrlMgr_QQ88.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d7efb554fcf8bf90a8f4ae4be53870b84c07ee17f7422dbe8e284a1f7ee63562.exe
Resource
win7-20240221-en
General
-
Target
d7efb554fcf8bf90a8f4ae4be53870b84c07ee17f7422dbe8e284a1f7ee63562
-
Size
472KB
-
MD5
617b63a6b9c28269a0f53e203515f42e
-
SHA1
e2998bdaef9cc54ff740beac572ce9cd25dc810f
-
SHA256
d7efb554fcf8bf90a8f4ae4be53870b84c07ee17f7422dbe8e284a1f7ee63562
-
SHA512
7eaceac7809d61e388d08fcf1bc7db31ba1cb73dfdf5e834b9c555561594016149a1acb7283a2ac475ba2b8e1a79505e0faf93de4241a5cdda185426f48d7899
-
SSDEEP
12288:9BVN4UPAYNj9hqKEzh0dljiZNMJCpqwgNQJ:9BVN4/YNj9hqz2Tu7MgpqwnJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7efb554fcf8bf90a8f4ae4be53870b84c07ee17f7422dbe8e284a1f7ee63562
Files
-
d7efb554fcf8bf90a8f4ae4be53870b84c07ee17f7422dbe8e284a1f7ee63562.exe windows:5 windows x86 arch:x86
1278ac8aa364e9d4e87aaa3f1324c3e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
GetModuleInformation
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
SetErrorMode
GetProcAddress
InitializeCriticalSection
WriteProcessMemory
SetUnhandledExceptionFilter
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
EnterCriticalSection
CreateEventW
DuplicateHandle
SearchPathW
CreateProcessW
WaitForMultipleObjects
TerminateProcess
ReadProcessMemory
VirtualAllocEx
GetVersionExW
GetSystemDefaultLangID
GetSystemInfo
CreateThread
TerminateThread
GetSystemTimeAsFileTime
InterlockedCompareExchange
MultiByteToWideChar
DeviceIoControl
GetLastError
GetSystemDirectoryW
LoadLibraryW
FreeLibrary
GetFileSize
ReadFile
WaitForSingleObject
CopyFileW
FindFirstFileW
FindClose
WideCharToMultiByte
LocalFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleExW
CreateProcessA
ResumeThread
GetThreadContext
SetThreadContext
GetCurrentThread
GetModuleFileNameW
VirtualAlloc
VirtualProtect
SetLastError
GetModuleHandleA
GetPrivateProfileIntA
SetFilePointer
GetTickCount
GlobalFindAtomW
GlobalAddAtomW
GetExitCodeThread
GetPrivateProfileStringW
Process32FirstW
Process32NextW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
OpenEventW
SetEvent
LoadLibraryExW
RaiseException
DecodePointer
MoveFileExW
FindNextFileW
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
DisconnectNamedPipe
GetLocalTime
GetFileAttributesW
FindFirstFileA
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreatePipe
CreateDirectoryW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
CloseHandle
Sleep
WriteFile
CreateFileW
SetFileAttributesW
DeleteFileW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
FlushInstructionCache
SetEnvironmentVariableA
RtlUnwind
GetCommandLineW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeW
FindFirstFileExW
IsProcessorFeaturePresent
GetStringTypeW
EncodePointer
OutputDebugStringW
IsDebuggerPresent
ExitProcess
QueryPerformanceCounter
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetTimeZoneInformation
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
EnumSystemLocalesW
user32
KillTimer
PostQuitMessage
TranslateMessage
SetTimer
PostThreadMessageW
GetMessageW
PeekMessageW
IsWindow
FindWindowW
SendMessageTimeoutW
advapi32
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueA
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFolderPathA
ole32
CoInitialize
CoCreateGuid
CoUninitialize
shlwapi
PathFileExistsW
PathFindFileNameW
PathFileExistsA
wnsprintfA
wnsprintfW
SHGetValueA
wininet
HttpSendRequestA
HttpOpenRequestW
InternetConnectW
InternetSetOptionW
InternetOpenA
InternetCloseHandle
ws2_32
htonl
htons
netapi32
Netbios
NetWkstaTransportEnum
NetApiBufferFree
urlmon
URLDownloadToFileW
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE