H:\Cocos2dProject\Da Hua Xi You\Qiao Ba x64\Qiao Ba Docker\x64\Release\Debugger.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf.exe
Resource
win10v2004-20240802-en
General
-
Target
4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf
-
Size
2.3MB
-
MD5
f671277892c9989c3a7810c8d2020054
-
SHA1
4e7291a9e83d4f3f7dd003403fe0e08c5f991b42
-
SHA256
4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf
-
SHA512
11bb13a40f778d15df3c2084437540f2e7668dbb119cbaf909e7caadff89ea491ef4f7c25ad5a18f81ff82160f01542ed4dede94a1c5468a207670c1434d8421
-
SSDEEP
49152:79w/pcfpepsYDAcXfk70KFMFTRH5qikH/xeVfdsfrX6QUy+D:pIcxepLf5KCVH51TVd+6BTD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf
Files
-
4dabfeb4dac9fa5dbe3d767f3cb99aa66428991ae878352dd3b457c280895cbf.exe windows:6 windows x64 arch:x64
9de44c48fb2cdd5a8dab8c51d46cfafd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
DeviceIoControl
GetVersionExW
GetLastError
CreateFileA
CloseHandle
WaitForDebugEvent
ContinueDebugEvent
GetCurrentThread
SetEndOfFile
WriteConsoleW
GetCurrentProcess
HeapSize
HeapReAlloc
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
CreateProcessA
WaitForSingleObject
GetModuleFileNameA
QueryPerformanceCounter
CreateFileW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
FindClose
FindFirstFileExW
FindNextFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
DeleteFileW
ReadFile
ReadConsoleW
GetTimeZoneInformation
MoveFileExW
IsValidCodePage
RtlUnwind
user32
DialogBoxParamA
GetWindowRect
SetWindowPos
SendMessageW
EndDialog
ShowWindow
MessageBeep
SetWindowTextA
LoadIconA
GetDlgItem
SystemParametersInfoW
EnableWindow
MessageBoxA
GetWindowTextA
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
iphlpapi
GetAdaptersInfo
msvcrt
_wcsnicmp
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ