D:\Git-repo\qb10frame\chrome\out\Release\uninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812.exe
Resource
win10v2004-20240802-en
General
-
Target
2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812
-
Size
691KB
-
MD5
9fc305c026a44cd522d1beb8c3609579
-
SHA1
28a08e63f22d18392c50956cf8c90d17d70a53d8
-
SHA256
2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812
-
SHA512
2e4f7738aeda761b9aebe648e7e389129a322f42d7748354caaff9390bf4a30514491ed8099ce1a69dcdea95325e27a1e1b604e56d7ad581afff0a46776d439d
-
SSDEEP
12288:Cj1oc/v9TzdHYvXJEe3SbRcEh5NnjadnJWcqreN6B06vOyVim6hElZyYBFS0sxe3:O1p/1WvSbRXhDadJuB04NohEiYvS0L3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812
Files
-
2132d4f09103e6514cbb383ffba0ef5a6260e5834d8561b7c68a2dbed7d97812.exe windows:6 windows x86 arch:x86
27308c729e894e18929c3656237e5629
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
TerminateProcess
RemoveDirectoryW
CreateThread
GetWindowsDirectoryW
GetExitCodeProcess
CreateProcessW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExW
GetCurrentProcess
GetModuleHandleW
ChangeTimerQueueTimer
DeleteTimerQueueTimer
CreateTimerQueueTimer
DeleteTimerQueue
CreateTimerQueue
LocalFree
GetCommandLineW
GetCurrentProcessId
OpenProcess
CopyFileW
GetTickCount
GetTempPathW
MoveFileExW
GetModuleFileNameW
DeleteFileW
WaitForSingleObject
DecodePointer
LeaveCriticalSection
EnterCriticalSection
FindNextFileW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
lstrlenW
FindFirstFileW
GetFullPathNameW
SetLastError
FindClose
GetProcAddress
LoadLibraryW
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
ReadFile
GetFileSize
CreateFileW
CloseHandle
SetThreadContext
GetThreadContext
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
GetCurrentDirectoryW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetStdHandle
ExitProcess
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringEx
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VerifyVersionInfoW
VerSetConditionMask
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
SetFilePointer
WriteFile
lstrcmpiW
GetLocalTime
GetShortPathNameW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetCurrentThreadId
ExpandEnvironmentStringsW
CreateEventW
CreateMutexW
OpenMutexW
GetSystemDefaultLangID
LocalAlloc
GlobalFree
ResumeThread
WritePrivateProfileStringW
SetEndOfFile
VirtualAlloc
VirtualFree
K32GetMappedFileNameW
OutputDebugStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
TerminateThread
GetSystemTimeAsFileTime
SetEvent
WaitForMultipleObjects
DeviceIoControl
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
QueryPerformanceCounter
user32
UnregisterClassW
PostMessageW
IsWindow
ShowWindow
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyWindow
GetSysColor
InvalidateRect
CopyRect
IsWindowVisible
SendInput
GetForegroundWindow
SetForegroundWindow
EnumWindows
ClientToScreen
SetWindowRgn
UpdateLayeredWindow
IsZoomed
IsIconic
PostThreadMessageW
PeekMessageW
GetDesktopWindow
GetWindowDC
LoadStringW
CharUpperW
GetDlgItem
GetClassInfoExW
RegisterClassExW
RedrawWindow
PostQuitMessage
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
MapWindowPoints
SetWindowPos
MoveWindow
SetWindowTextW
CallWindowProcW
DefWindowProcW
SetWindowLongW
OffsetRect
KillTimer
SetTimer
EqualRect
SendMessageW
SetCapture
ReleaseCapture
UnionRect
PtInRect
CreateWindowExW
GetCursorPos
ScreenToClient
IntersectRect
IsWindowEnabled
IsRectEmpty
BeginPaint
EndPaint
GetClientRect
EnumChildWindows
GetParent
DestroyIcon
SetRectEmpty
LoadImageW
SetCursor
LoadCursorW
GetWindowLongW
UpdateWindow
DrawFocusRect
GetDC
ReleaseDC
DrawTextW
FindWindowW
FindWindowExW
GetWindowThreadProcessId
MessageBoxW
gdi32
GetStockObject
GetCurrentObject
GetTextExtentPoint32W
ExtTextOutW
SetBkColor
SetBitmapBits
GetBitmapBits
SetDIBColorTable
GetTextExtentExPointW
SetTextColor
SetBkMode
DeleteObject
LineTo
MoveToEx
SelectObject
CreatePen
DeleteDC
CreateDIBSection
SetViewportOrgEx
CreateCompatibleDC
CreateFontIndirectW
GetObjectW
SaveDC
RestoreDC
GetViewportOrgEx
BitBlt
GetClipBox
RectVisible
SelectClipRgn
CreateRectRgnIndirect
CombineRgn
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
ConvertSidToStringSidW
GetTokenInformation
RegQueryValueExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ole32
CoUninitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
PathRemoveBackslashW
PathRemoveBlanksW
PathCanonicalizeW
SHGetValueW
PathMatchSpecW
PathFindFileNameW
SHDeleteValueW
SHDeleteKeyW
PathIsDirectoryEmptyW
PathIsDirectoryW
PathIsRootW
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipDeletePen
GdipCreatePen1
GdipFillEllipseI
GdipCloneBrush
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateLineBrush
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePixelFormat
GdiplusStartup
GdipCreateLineBrushFromRect
GdipFillRectangle
GdipGetImageGraphicsContext
GdipDrawImageI
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageRectRectI
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipResetWorldTransform
GdipDisposeImage
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawEllipseI
GdiplusShutdown
GdipSetPenWidth
netapi32
NetApiBufferFree
NetWkstaTransportEnum
Netbios
psapi
GetProcessImageFileNameW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
htonl
htons
winhttp
WinHttpSendRequest
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpWriteData
WinHttpOpenRequest
WinHttpReadData
Sections
.text Size: 504KB - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ