D:\jenkins_Trunk\workspace\10.10Patch_SourceJob\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4.exe
Resource
win10v2004-20240802-en
General
-
Target
20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4
-
Size
1.3MB
-
MD5
f2f4b332cfe6f6766e8ffc2e7162dcd4
-
SHA1
7dfa11734f75739eb8bcf0a0b5bae5cd86b61b82
-
SHA256
20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4
-
SHA512
581b649bbbd0b07a01e031da5712bb5c2fb91e01f31018f4fbe3c539b5c981f23b7433989e11747a725813b6ca11cab907d8efa847fabe984c62633fd660ea3b
-
SSDEEP
24576:38PdhWYBzywr85Zq6mYbZTizjoiDU8vymm7TKBeAzOlfpM:38lB5Yd2wKU8vJwTKBJzepM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4
Files
-
20b5f833a3c1f5a9b505f944f6795393b8dee0d9cc03ff23b8f5a79627c886b4.exe windows:4 windows x86 arch:x86
ca1fa6dba5b4b32f4299d4278fa445b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenMutexW
CreateMutexW
MapViewOfFileEx
CreateFileMappingW
lstrcmpiW
CreateDirectoryW
SetFilePointer
OutputDebugStringW
GetExitCodeProcess
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
MoveFileExW
RemoveDirectoryW
LocalAlloc
LocalFree
Module32FirstW
Module32NextW
SetThreadPriority
GetCurrentThread
ReleaseMutex
OpenThread
SuspendThread
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
SetEndOfFile
GetTempFileNameW
SetFileAttributesW
MoveFileW
GetFullPathNameW
SetFileTime
GetSystemInfo
IsBadReadPtr
LoadLibraryExW
SetCurrentDirectoryW
GetPrivateProfileIntW
GlobalMemoryStatus
GetDriveTypeW
RaiseException
GetLogicalDriveStringsW
WriteFile
FreeResource
GetDiskFreeSpaceExW
OpenSemaphoreW
CreateNamedPipeW
OpenEventW
LocalFileTimeToFileTime
ResumeThread
FreeLibrary
GetProcessTimes
SystemTimeToFileTime
SleepEx
TerminateThread
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleA
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
DeviceIoControl
GetVersion
WideCharToMultiByte
lstrcmpW
GetPrivateProfileStringW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
FlushInstructionCache
FindClose
lstrlenW
FindNextFileW
GetFileAttributesW
FindFirstFileW
SetLastError
CreateThread
LoadResource
LockResource
SizeofResource
FindResourceW
WritePrivateProfileStringW
MultiByteToWideChar
GetCurrentDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
FindResourceExW
OpenProcess
SearchPathW
InitializeCriticalSection
SetErrorMode
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
CreateProcessW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
SetEvent
WaitForSingleObject
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
GetLocalTime
CreatePipe
GetCPInfo
LoadLibraryA
VirtualQuery
GetSystemDefaultLangID
CreateFileA
GlobalAlloc
GlobalLock
GetTempPathW
lstrlenA
GetSystemTime
user32
GetPropW
SetWindowLongW
SetPropW
PostMessageW
DestroyWindow
RemovePropW
UnregisterClassW
IsIconic
FindWindowA
SendMessageTimeoutW
CopyRect
RegisterClassExW
MessageBoxW
CreateWindowExW
FindWindowW
DefWindowProcW
CharLowerW
LoadImageW
PostQuitMessage
GetWindowPlacement
PostThreadMessageW
EndPaint
TrackPopupMenu
BeginPaint
GetSystemMenu
DrawFrameControl
EqualRect
GetDlgCtrlID
IsWindowVisible
DrawIconEx
GetKeyState
SetCursor
GetMonitorInfoW
MonitorFromWindow
SetWindowRgn
PtInRect
ReleaseCapture
OffsetRect
UpdateLayeredWindow
SetCapture
CallWindowProcW
FrameRect
FillRect
GetWindowDC
ClientToScreen
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetTimer
KillTimer
DrawTextW
CharUpperW
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
GetDC
CharNextW
ReleaseDC
InflateRect
MoveWindow
SetActiveWindow
SetWindowPos
DispatchMessageW
TranslateMessage
GetMessageW
GetWindow
IsWindow
SystemParametersInfoW
PeekMessageW
MapWindowPoints
LoadCursorW
EnableWindow
ShowWindow
IsWindowEnabled
GetDesktopWindow
GetClientRect
GetClassInfoExW
GetActiveWindow
GetWindowRect
SetRect
SendMessageW
GetWindowLongW
InvalidateRect
GetDlgItem
GetParent
LoadIconW
CopyImage
LoadStringW
UnregisterClassA
GetClassNameW
EnumWindows
gdi32
GetTextMetricsW
ExtSelectClipRgn
CreateSolidBrush
SelectClipRgn
CreateRectRgnIndirect
GetClipRgn
RoundRect
SetBkMode
Rectangle
GetObjectW
SelectObject
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
BitBlt
CreateBitmap
StretchBlt
SetBkColor
SetTextColor
CreateFontIndirectW
DeleteDC
ExtTextOutW
CreatePen
DeleteObject
AddFontResourceW
CreateRectRgn
RestoreDC
TextOutW
RectInRegion
CombineRgn
GetTextExtentPoint32W
LineTo
MoveToEx
SaveDC
OffsetRgn
advapi32
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
QueryServiceConfigW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CloseServiceHandle
OpenServiceW
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyExW
LookupAccountNameW
shell32
SHGetSpecialFolderLocation
ShellExecuteW
CommandLineToArgvW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
CoInitializeEx
CLSIDFromProgID
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoFreeLibrary
CoLoadLibrary
CoTaskMemRealloc
CoUninitialize
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
VariantCopy
OleLoadPicture
VariantInit
VarUI4FromStr
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathIsDirectoryW
PathAddBackslashW
StrToIntA
PathFindFileNameW
PathRemoveBackslashW
PathAppendW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htonl
htons
ntohl
wininet
InternetCloseHandle
InternetGetConnectedState
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
netapi32
Netbios
Sections
.text Size: 924KB - Virtual size: 922KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ