F:\work\capture\ScreenRecorder\rel\Win32\QYServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c.exe
Resource
win10v2004-20240802-en
General
-
Target
b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c
-
Size
263KB
-
MD5
18c99022aa9fbea6b272663361b968d1
-
SHA1
fde4af1ba61e5c8eac17cd6e65af8cbd55c78d72
-
SHA256
b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c
-
SHA512
85c81eb72b652f2db9b2e5d97611113116e36a3fea206b48a472cd04c7e5f183af62ac85c473c1f62a3250d2d06f98dfc92fb6096ebd11564feb917249eff606
-
SSDEEP
6144:xIuDktUQOZ3GiC1lzoCTyrtYFxtm1n9USWmRM:x1zWL1lzoXtYP+Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c
Files
-
b65fb9ef57321e834d5e4329ad725b8954eca252276f44e24a92c7fe6591356c.exe windows:6 windows x86 arch:x86
e46ca48ca136375c68348c6542465df4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathAppendW
PathRemoveFileSpecW
PathCombineW
comctl32
InitCommonControlsEx
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
kernel32
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
EncodePointer
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
WriteFile
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
LCMapStringW
GetFileType
SetUnhandledExceptionFilter
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
OpenProcess
LoadLibraryA
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
GetTickCount
FindResourceExW
LockResource
CreateThread
CloseHandle
TerminateThread
SetLastError
GetCurrentThreadId
RaiseException
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
SetEvent
WaitForSingleObject
CreateEventW
GetLastError
GetModuleFileNameW
SetThreadLocale
GetThreadLocale
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
user32
TranslateMessage
DispatchMessageW
DefWindowProcW
CharNextW
UnregisterClassW
GetMessageW
PeekMessageW
DestroyWindow
SetWindowLongW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
wsprintfW
CallWindowProcW
GetWindowLongW
PostQuitMessage
advapi32
RegEnumKeyExW
DuplicateTokenEx
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
SetServiceStatus
RegisterServiceCtrlHandlerW
DeleteService
OpenServiceW
CloseServiceHandle
CreateServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ole32
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VarUI4FromStr
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ