wa_3rd_party_host_32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a.exe
Resource
win10v2004-20240709-en
General
-
Target
7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a
-
Size
2.3MB
-
MD5
4c91f27ba8ade0db705c7f802dcb4507
-
SHA1
a826d603ad9e485e4e783b2f18b0654d55dc9f86
-
SHA256
7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a
-
SHA512
7697ae93fb464db4a5c27f88f8b649cc328fe8664971aff074f713b13758ddca56f85489e3b0fabc232bb2941642088157608ca342e21e73062361960e212935
-
SSDEEP
49152:hCvzpbZhModCRnPz6+BhoiqkhR/a14EkDoZXJ5tx67bZvHb/jLNJRd4ZPCz76Q:hCZZhMPRnPgXJ5X67b+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a
Files
-
7803d96a4a965ba34fbfd475ee374820273b5acc88476115c1555774981e307a.exe windows:6 windows x86 arch:x86
f1c42db92faa8567ad2ad34fbefc61e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
CloseHandle
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
GetProcAddress
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetTickCount64
SizeofResource
GetModuleHandleExW
GetModuleFileNameW
LocalAlloc
FreeResource
LockResource
LoadResource
FindResourceW
SetErrorMode
LoadLibraryExW
InitializeCriticalSectionEx
RaiseException
Sleep
GetWindowsDirectoryW
GetEnvironmentStringsW
GetCurrentDirectoryW
SetCurrentDirectoryW
FindFirstFileW
FindNextFileW
FindClose
FileTimeToSystemTime
GetFileTime
GetVolumeNameForVolumeMountPointW
GetLogicalDriveStringsW
GetDriveTypeW
DeviceIoControl
GetSystemWindowsDirectoryW
lstrcpyW
GetModuleHandleW
WaitForMultipleObjects
CreateEventW
SetEvent
CreateNamedPipeW
OpenProcess
CreateThread
GetOverlappedResult
ConnectNamedPipe
GetExitCodeProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
DisconnectNamedPipe
CreateDirectoryW
GetCurrentProcess
CreateProcessW
CopyFileW
SetLastError
lstrcpynW
GetLocaleInfoW
TerminateProcess
GetTempFileNameW
ExpandEnvironmentStringsW
GetVersionExW
GetTimeZoneInformation
GetSystemDirectoryW
ReleaseMutex
CreateMutexA
VirtualAlloc
VirtualFree
VirtualQuery
WriteConsoleW
ReadConsoleW
SetStdHandle
MultiByteToWideChar
HeapSize
HeapValidate
UnmapViewOfFile
GetCurrentThreadId
GetFileAttributesW
CreateFileW
WaitForSingleObject
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
AreFileApisANSI
GetFullPathNameA
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
EnterCriticalSection
HeapFree
HeapCreate
TryEnterCriticalSection
ReadFile
DecodePointer
FreeEnvironmentStringsW
FindFirstFileExW
SetEnvironmentVariableW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetOEMCP
GetACP
IsValidCodePage
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
GetStdHandle
ExitProcess
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
GetModuleHandleA
FreeLibraryAndExitThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
QueryPerformanceFrequency
EncodePointer
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetCPInfo
CreateTimerQueue
GetThreadTimes
LoadLibraryExA
user32
PostThreadMessageW
wsprintfW
advapi32
OpenSCManagerW
EqualSid
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
QueryServiceStatus
OpenServiceW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
CloseServiceHandle
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
AccessCheck
GetFileSecurityW
DuplicateToken
MapGenericMask
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSaveKeyW
OpenProcessToken
ole32
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CoCreateInstance
IIDFromString
CLSIDFromString
CoAddRefServerProcess
CoReleaseServerProcess
OleRun
oleaut32
GetErrorInfo
VariantTimeToSystemTime
VariantClear
SafeArrayCreateVector
SafeArrayCreate
SafeArrayLock
VariantCopy
SafeArrayPutElement
SysAllocString
SysFreeString
SafeArrayGetDim
SysStringLen
SysAllocStringLen
SafeArrayDestroy
VariantInit
SafeArrayGetElement
SafeArrayUnlock
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
shlwapi
StrStrIW
wininet
HttpSendRequestW
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetReadFile
HttpOpenRequestW
Exports
Exports
_QHChangeOnAccessScanState@8
_QHEnableOnAccessScan@8
_QHFreeThreatHistoryListA@8
_QHFreeThreatHistoryListW@8
_QHGetAppLanguageA@16
_QHGetAppLanguageW@16
_QHGetDigitalCertSignerA@12
_QHGetDigitalCertSignerW@12
_QHGetEngineVersionA@12
_QHGetEngineVersionW@12
_QHGetExpDate@8
_QHGetLastFullScanTime@8
_QHGetProductInstallDirA@12
_QHGetProductInstallDirW@12
_QHGetSASQHStatus@8
_QHGetSigDatabaseDirA@12
_QHGetSigDatabaseDirW@12
_QHGetSigDatabaseTime@8
_QHGetSigDatabaseVersionA@12
_QHGetSigDatabaseVersionW@12
_QHGetThreatHistoryA@8
_QHGetThreatHistoryW@8
_QHInitUpdate@4
_QHInitiateFileScanA@8
_QHInitiateFileScanW@8
_QHInitiateFolderScanA@8
_QHInitiateFolderScanW@8
_QHInitiateFullScan@4
_QHIsAVInstalled@4
_QHIsFullScanRunning@4
_QHIsLicenseExpired@4
_QHIsOnAccessScanEnabled@4
_QHIsUpdateInProgress@4
_QHOpenScanner@4
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 234KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ