E:\WS\tv_prel_dcr\build_cmake_win\HOST\Release\TeamViewer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c.exe
Resource
win10v2004-20240704-en
General
-
Target
d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c.exe
-
Size
58.5MB
-
MD5
4852c0ff7e02f8841e3a6af146d69556
-
SHA1
74d71736de8cb9df31cb59589895656990046813
-
SHA256
d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c
-
SHA512
f62645248642d9e68cc1c0b76a6b61d3b376ddf909f75ff219655c1b7711c3fd4f8b88dfcb7885c52685cfa903dc7a4eba55b42320deb8bc2484cf601ec16b09
-
SSDEEP
1572864:dNp+fO/7sER9gQWwUPGxZH0Zfy7l41HJHvE5ZyDiEMKri:d8wPDKDvMKO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c.exe
Files
-
d24b622ee7dc6ec0e89d9d561ce161a4336322b4d22614284810116434e66c1c.exe.exe windows:6 windows x86 arch:x86
18072d0a06d56d26a632ac3e54657938
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
DeleteCriticalSection
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
DecodePointer
HeapDestroy
GetProcessHeap
WaitForMultipleObjects
WaitForSingleObject
PostQueuedCompletionStatus
FormatMessageW
SetEvent
TerminateThread
CloseHandle
QueueUserAPC
LocalFree
WideCharToMultiByte
FormatMessageA
CreateEventA
UnregisterWaitEx
RegisterWaitForSingleObject
UnregisterWait
ResetEvent
SetLastError
GetCurrentThreadId
RaiseException
GetUserDefaultLCID
GetStringTypeExW
LCMapStringW
LoadLibraryA
FreeLibrary
GetTickCount
GetCurrentProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCommandLineW
ExpandEnvironmentStringsW
SetErrorMode
SetProcessShutdownParameters
CreateMutexW
ReleaseMutex
GetCurrentProcessId
ReleaseSemaphore
WaitForSingleObjectEx
GlobalSize
GlobalUnlock
GlobalLock
CreateDirectoryW
GetTempPathW
GetTempFileNameW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetQueuedCompletionStatus
SetWaitableTimer
SleepEx
CreateEventW
CreateIoCompletionPort
CreateWaitableTimerW
GetStringTypeExA
LCMapStringA
CreateFileW
InitializeCriticalSection
GetProcAddress
QueryPerformanceCounter
QueryPerformanceFrequency
DuplicateHandle
CreateSemaphoreA
GetModuleHandleW
CreateThread
GetCurrentThread
CompareStringW
CompareFileTime
SizeofResource
LockResource
LoadResource
FindResourceW
MultiByteToWideChar
MulDiv
VerSetConditionMask
VerifyVersionInfoW
lstrlenW
GlobalAlloc
GlobalReAlloc
GetLocalTime
GetTimeFormatW
GlobalFree
FindResourceExW
CopyFileW
LoadLibraryExW
GetLocaleInfoW
GetSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeZoneInformation
GetDateFormatW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentDirectoryW
Sleep
GetProcessTimes
SetPriorityClass
GetPriorityClass
OpenProcess
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExW
GetConsoleTitleW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
CreateSemaphoreW
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetNativeSystemInfo
FindClose
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetComputerNameW
GetNumberFormatW
GetCurrencyFormatW
GetSystemDefaultLCID
OutputDebugStringW
GetTempPathA
GetTempFileNameA
GetCPInfo
LocalAlloc
LocalSize
DebugBreak
GetFileSize
SetEndOfFile
InitializeCriticalSectionEx
CreateFileMappingW
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
GetFileAttributesW
SetHandleInformation
SetFileCompletionNotificationModes
CancelIoEx
CancelIo
SwitchToThread
SetConsoleCtrlHandler
GetFileType
GetConsoleMode
CreateFileA
FlushFileBuffers
ReadFile
WriteFile
ConnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
CreateNamedPipeW
WaitNamedPipeW
GetNamedPipeHandleStateW
CancelSynchronousIo
QueueUserWorkItem
CreateNamedPipeA
SetConsoleMode
GetNumberOfConsoleInputEvents
ReadConsoleInputW
ReadConsoleW
WriteConsoleW
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
GetConsoleCursorInfo
SetConsoleCursorInfo
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
SetConsoleTextAttribute
WriteConsoleInputW
TerminateProcess
GetExitCodeProcess
CreateProcessW
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetDiskFreeSpaceW
GetFileInformationByHandle
GetFileSizeEx
RemoveDirectoryW
SetFilePointerEx
SetFileTime
DeviceIoControl
ReOpenFile
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetLongPathNameW
GetShortPathNameW
ReadDirectoryChangesW
GetStdHandle
GetStartupInfoW
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleExW
GetACP
LoadLibraryW
ReadConsoleA
GetExitCodeThread
GetSystemPowerStatus
lstrcmpiW
GetProcessId
ProcessIdToSessionId
OpenEventW
SetThreadPriority
GetOverlappedResult
K32EnumProcessModules
K32GetModuleFileNameExW
GetSystemFirmwareTable
OpenMutexW
CreateFileMappingA
OpenFileMappingA
MapViewOfFileEx
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetSystemDefaultLangID
GetGeoInfoW
lstrcmpW
OutputDebugStringA
GetUserDefaultUILanguage
LCIDToLocaleName
GetUserGeoID
GetLocaleInfoEx
QueryFullProcessImageNameW
CreatePipe
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteFileW
AreFileApisANSI
HeapCreate
LockFile
GetFullPathNameA
UnlockFileEx
HeapValidate
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
GetVersionExA
DeleteFileA
HeapCompact
UnlockFile
LockFileEx
GetDriveTypeW
GetLogicalDriveStringsW
GetVolumeInformationW
SetFileAttributesW
IsDebuggerPresent
OpenEventA
OpenThread
GetComputerNameExA
GetComputerNameExW
SetUnhandledExceptionFilter
GetSystemDirectoryW
GetSystemDefaultUILanguage
MoveFileW
LocalFileTimeToFileTime
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetDiskFreeSpaceExW
WTSGetActiveConsoleSessionId
IsWow64Process
K32GetModuleBaseNameW
K32EnumProcesses
GetSystemTimes
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
GetLogicalProcessorInformationEx
GetEnvironmentVariableA
GetDynamicTimeZoneInformation
GetTickCount64
GetThreadTimes
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
GetOEMCP
GetLastError
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetFilePointer
LoadLibraryExA
VirtualQuery
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
GetStringTypeW
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
FindFirstFileExW
SetFileInformationByHandle
CreateDirectoryExW
LCMapStringEx
CompareStringEx
GetFileTime
GetWindowsDirectoryW
CopyFileExW
UnhandledExceptionFilter
WaitForMultipleObjectsEx
CreateWaitableTimerA
RtlUnwind
ExitThread
FreeLibraryAndExitThread
SetStdHandle
GetConsoleOutputCP
ExitProcess
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetCommandLineA
imm32
ImmNotifyIME
ImmGetCompositionStringW
ImmAssociateContextEx
ImmReleaseContext
ImmGetContext
ImmIsIME
ImmSetCandidateWindow
Sections
.text Size: 43.1MB - Virtual size: 43.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IPPCODE Size: 262KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9.5MB - Virtual size: 9.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 889KB - Virtual size: 888KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ