F:\work\capture\ScreenRecorder\rel\Win32\qycaphelper32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a.exe
Resource
win10v2004-20240802-en
General
-
Target
433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a
-
Size
110KB
-
MD5
03e3236d33fa8979e73906f97f432c6b
-
SHA1
4d01e1f20cd51dd9b1e98801872a4f52093392d0
-
SHA256
433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a
-
SHA512
36c1ac2dbe99ddbe1921ab00e58d75f4a429d14c6440ebb8dd6f46229a33b8a5cbab65c108c2a0fd24511b06607a76a0993263930ae653d8cc59f1f0afcf1b8e
-
SSDEEP
3072:0YMjh6nqhhncxgTBg7aoHuOgi+vQFRhR//YJNY:s0qhR0MBmH9ivJNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a
Files
-
433e223fbefb856d66c5072a27f6b58eaa33e4f820f660884801ce77ec06f05a.exe windows:6 windows x86 arch:x86
f986f15b072367e32e22280ef3c881fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
SetEvent
LoadLibraryA
CloseHandle
GetProcAddress
OpenEventW
GetModuleHandleW
CreateRemoteThread
CreateFileW
DecodePointer
WaitForSingleObject
GetCurrentProcess
VirtualAllocEx
WriteProcessMemory
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
CompareStringW
LCMapStringW
GetProcessHeap
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
user32
PostThreadMessageW
SetWindowsHookExW
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ