R:\TempView\QD4.5.0.18\output\BinFinal\QQProtect.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc.exe
Resource
win10v2004-20240508-en
General
-
Target
1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc
-
Size
191KB
-
MD5
a7ce0daef9aeb333ff604c0611a5297f
-
SHA1
35e1ba0bae94a84cb9513e4b49eceeb31bc07125
-
SHA256
1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc
-
SHA512
74a781fe128feceaa8ec9a872c63d69c1afce5a9b820d97548c757eb7af0da29399c48607a05ed888571ab2647ede8252633c9aafb62468f98e89e175efdfdc4
-
SSDEEP
3072:Zdp5u+H2S+bkw8ZgmB8OymJ9uEAT2CIv2Hq7kLSS5ub7jN10LzooZptVxb:Zdp5bHp5MW8Oye8T2CfqESS07jN1Iooh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc
Files
-
1aa5848d33fdc98b8ab1492317e4662da7f7c6eb7c2557bb4b3a102cd4f2fedc.exe windows:5 windows x86 arch:x86
672901d113558979ebbc7a994e4c46fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
tinyxml
?NextSiblingElement@TiXmlNode@@QAEPAVTiXmlElement@@PBD@Z
?FirstChildElement@TiXmlNode@@QAEPAVTiXmlElement@@PBD@Z
??1TiXmlDocument@@UAE@XZ
?RootElement@TiXmlDocument@@QAEPAVTiXmlElement@@XZ
?GetText@TiXmlElement@@QBEPBDXZ
?Attribute@TiXmlElement@@QBEPBDPBD@Z
?Attribute@TiXmlElement@@QBEPBDPBDPAH@Z
?LoadXML@TiXmlDocument@@QAE_NPADHW4TiXmlEncoding@@@Z
??0TiXmlDocument@@QAE@XZ
kernel32
GetCurrentThreadId
ResumeThread
SetLastError
CreateFileA
GetFileSize
CloseHandle
ReadFile
FreeLibrary
GetModuleFileNameW
CreateFileW
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
LocalAlloc
LocalFree
VirtualProtect
MultiByteToWideChar
ExpandEnvironmentStringsW
DeleteCriticalSection
lstrlenW
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
Sleep
CreateEventW
CreateThread
WaitForMultipleObjects
WaitForSingleObject
GetVersionExW
SetEvent
GetCommandLineW
GetStartupInfoW
HeapSetInformation
InterlockedExchange
DecodePointer
EncodePointer
VirtualAlloc
GetLastError
FlushInstructionCache
VirtualFree
InterlockedCompareExchange
GetCurrentProcess
VirtualQuery
SetThreadContext
GetThreadContext
GetProcAddress
LoadLibraryW
GetModuleHandleW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
user32
LoadStringW
PostThreadMessageW
CharNextW
advapi32
RegisterServiceCtrlHandlerW
SetServiceStatus
DeregisterEventSource
ReportEventW
RegisterEventSourceW
QueryServiceStatus
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
StartServiceCtrlDispatcherW
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoRevokeClassObject
CoCreateInstance
oleaut32
VarUI4FromStr
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
shlwapi
wnsprintfW
PathFileExistsA
wnsprintfA
msvcp100
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
msvcr100
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_controlfp_s
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
?terminate@@YAXXZ
_CxxThrowException
memcpy
_configthreadlocale
__CxxFrameHandler3
??3@YAXPAX@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
memmove
wcscpy_s
??_V@YAXPAX@Z
memcpy_s
_snprintf
_wcsicmp
wcstoul
_stricmp
strcpy_s
_snwprintf
_snwprintf_s
strtoul
_errno
wcsncpy_s
malloc
free
wcsstr
_recalloc
vswprintf_s
_putws
_purecall
memset
_unlock
__dllonexit
_lock
_onexit
netapi32
Netbios
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE