E:\xd_release\qyscreen\ScreenRecorder\rel\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b.exe
Resource
win10v2004-20240426-en
General
-
Target
cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b
-
Size
4.8MB
-
MD5
59dfe3ed2c99491a7d1d18b3a95c6a0d
-
SHA1
efbc48a1716f9d595f8c9ae52c2380f9bf560597
-
SHA256
cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b
-
SHA512
dcc2761107cb679dd9f478569be11819e08195153bc2ab2504f725f7b3ebc259f43865d25192e39caea822b6183a881b66ef92685c7a6b360173278154760568
-
SSDEEP
98304:pimpfqoGL1I5N+CYKKr1LDbj4zb5+v+oc8M0r1pgVJMnd:t01IerKQj64v+oea8Ed
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b
Files
-
cd3bcbb3326b625a3118fe3766b81ebf5eb733e598d526aff3bebe6325e5287b.exe windows:5 windows x86 arch:x86
c9d068867436fffd4477fe33d9d5c0ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
WritePrivateProfileStringW
LoadLibraryExW
lstrcmpiW
GetProcAddress
FreeLibrary
GetVersion
GetModuleHandleW
FindResourceExW
FindResourceW
GetModuleFileNameW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
GetProcessHeap
WriteConsoleW
FlushFileBuffers
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
ReadConsoleW
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
GetConsoleMode
SetFilePointerEx
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetCurrentThread
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
InterlockedFlushSList
RtlUnwind
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
FormatMessageW
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedDecrement
InterlockedIncrement
DecodePointer
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
OpenEventW
LocalAlloc
GetStartupInfoW
CreatePipe
CopyFileW
CreateDirectoryW
MoveFileW
CreateThread
GetPrivateProfileIntW
GetFileTime
SetFileTime
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetVersionExW
WideCharToMultiByte
GetPrivateProfileStringW
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
GetSystemTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
Thread32First
Thread32Next
GetCurrentProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CreateRemoteThread
ReadProcessMemory
LoadLibraryW
lstrcpyW
lstrlenW
GetProcessId
Module32FirstW
Module32NextW
GlobalAlloc
GlobalFree
lstrcmpA
WTSGetActiveConsoleSessionId
GetThreadLocale
SetThreadLocale
DeleteFileW
Sleep
CreateFileW
DeviceIoControl
GetSystemInfo
GetWindowsDirectoryW
GetSystemDirectoryW
GetEnvironmentVariableW
GetTempPathW
LocalFree
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
WriteFile
SetFilePointer
GetFileAttributesExW
OutputDebugStringW
FileTimeToSystemTime
lstrlenA
SetFileAttributesW
MoveFileExW
lstrcpynA
InitializeCriticalSection
FlushViewOfFile
UnmapViewOfFile
SetEndOfFile
CreateFileMappingW
MapViewOfFile
GetFileSizeEx
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetLongPathNameW
IsBadReadPtr
GetDriveTypeW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetNativeSystemInfo
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
TerminateThread
CreateEventW
CreateIoCompletionPort
InterlockedExchange
GetQueuedCompletionStatus
SetErrorMode
FreeResource
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleA
GetCurrentProcessId
MulDiv
GetTempFileNameW
CreateFileA
user32
CharNextW
PeekMessageW
DispatchMessageW
wsprintfW
GetWindowThreadProcessId
GetForegroundWindow
AttachThreadInput
SetForegroundWindow
BringWindowToTop
TranslateMessage
FindWindowW
FindWindowExW
SetFocus
WaitForInputIdle
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
CharLowerBuffW
PostMessageW
SetRectEmpty
EqualRect
GetMessageW
ClientToScreen
GetCursorPos
PtInRect
ScreenToClient
GetDoubleClickTime
CopyRect
IntersectRect
DrawTextW
LoadImageW
IsRectEmpty
GetIconInfo
DrawIconEx
FillRect
SystemParametersInfoW
BeginPaint
EndPaint
IsIconic
InvalidateRect
TrackMouseEvent
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetWindowTextW
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
SetWindowTextW
GetWindowTextLengthW
GetFocus
GetDC
ReleaseDC
MonitorFromPoint
GetSystemMetrics
UpdateLayeredWindow
UpdateWindow
MessageBoxW
GetMonitorInfoW
MonitorFromWindow
LoadIconW
GetWindow
GetParent
MapWindowPoints
GetWindowRect
GetClientRect
GetDlgItem
SetWindowPos
MoveWindow
ShowWindow
PostQuitMessage
SendMessageW
LoadCursorW
SetWindowLongW
GetWindowLongW
KillTimer
SetTimer
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
DefWindowProcW
SetCursor
SetActiveWindow
advapi32
GetUserNameA
RegOpenKeyW
RegCreateKeyW
RegSetValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegEnumKeyW
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
SetTokenInformation
GetLengthSid
DeleteService
ControlService
ChangeServiceConfigW
QueryServiceConfigW
QueryServiceStatus
CloseServiceHandle
CreateServiceW
StartServiceW
OpenServiceW
AccessCheck
MapGenericMask
DuplicateToken
GetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
GetUserNameW
RegConnectRegistryW
LookupAccountNameA
GetSidIdentifierAuthority
IsValidSid
RegNotifyChangeKeyValue
RegQueryValueExW
shell32
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHCreateDirectoryExW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ord165
CommandLineToArgvW
SHGetMalloc
SHGetFolderPathW
ole32
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
CoCreateGuid
CoInitializeEx
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
OleRun
oleaut32
VariantCopy
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
GetErrorInfo
VariantClear
SetErrorInfo
SysAllocString
VarUI4FromStr
SysAllocStringLen
VariantChangeType
VarDateFromStr
SystemTimeToVariantTime
VariantTimeToSystemTime
LoadRegTypeLi
CreateErrorInfo
VariantInit
LoadTypeLi
SysStringLen
SysFreeString
shlwapi
ord176
PathRemoveFileSpecW
PathAppendW
PathSearchAndQualifyW
StrToIntExW
UrlGetPartW
AssocQueryStringW
PathIsRootW
PathCombineW
PathCanonicalizeW
PathRemoveBackslashW
PathIsPrefixW
PathCommonPrefixW
PathRelativePathToW
StrFormatByteSizeW
PathAddBackslashW
StrCmpIW
PathFindFileNameW
SHGetValueW
SHDeleteKeyW
SHSetValueW
SHDeleteValueW
PathIsDirectoryW
PathFileExistsW
PathRemoveExtensionW
StrCpyNW
comctl32
ord17
InitCommonControlsEx
msimg32
AlphaBlend
dbghelp
ImageNtHeader
ImageDirectoryEntryToData
wininet
InternetCloseHandle
InternetQueryOptionW
InternetReadFile
InternetSetFilePointer
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
InternetSetOptionW
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
crypt32
CertGetNameStringW
CryptStringToBinaryA
CryptStringToBinaryW
CryptBinaryToStringA
CryptBinaryToStringW
gdiplus
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipLoadImageFromStream
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipDeleteBrush
GdipCloneBrush
GdipCreateSolidFill
GdipCreateFromHDC
GdipSetTextRenderingHint
GdipDrawString
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdiplusStartup
GdipLoadImageFromStreamICM
GdipDrawImageRectRectI
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipSetInterpolationMode
GdipDrawImageRectI
GdipSetSmoothingMode
GdipCreateBitmapFromStreamICM
psapi
GetModuleFileNameExW
EnumProcessModules
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
netapi32
Netbios
iphlpapi
GetIpAddrTable
GetAdaptersInfo
secur32
GetUserNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wintrust
WTHelperProvDataFromStateData
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
gdi32
SetStretchBltMode
DeleteDC
BitBlt
SetPixel
CreateCompatibleDC
StretchBlt
DeleteObject
CreateDIBSection
SelectObject
SetTextColor
SetBkMode
GetBitmapBits
SetBitmapBits
CreateSolidBrush
CreateRoundRectRgn
CombineRgn
CreateRectRgn
SetBkColor
GetStockObject
GetObjectW
CreateRectRgnIndirect
ExtSelectClipRgn
SaveDC
SetTextCharacterExtra
GetCurrentObject
GetTextColor
CreateFontIndirectW
RestoreDC
Rectangle
CreatePen
GetDeviceCaps
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41.7MB - Virtual size: 41.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ