D:\code\bytedance\installer\LVInstallerCC\VideofusionInstaller\build\CC_RELEASE\JianyingLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195N.exe
Resource
win10v2004-20241007-en
General
-
Target
184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195N
-
Size
2.0MB
-
MD5
7d6d42c1979725f67c64b553d0d7e1f0
-
SHA1
03b1ba65f422b2df702250184e39731dad1697d5
-
SHA256
184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195
-
SHA512
54e640bc261e8a6cd8fadd1098e42cd6892efddc45b16c35e25717db1d1dd48d05c2af7be37758a07f74f53677b5706862e6b9e8b2d804cd578e7cd8d005c9aa
-
SSDEEP
49152:80ZWI+llRK7lC1oClOQZFcYG61tVeNIcTr6wtRPG5pDmg27RnWGj:FUVaYNnnVRERP4D527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195N
Files
-
184e0897921881b774e863463457fbca837ecb5cfe012f052a2bd143f1e1a195N.exe windows:6 windows x86 arch:x86
6fa91ee3b9c1420b0a56cccb4bd80696
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
powrprof
PowerDeterminePlatformRole
setupapi
CM_Get_Device_IDW
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
kernel32
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
ProcessIdToSessionId
GetCommandLineW
GetEnvironmentVariableW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
GetTempPathW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetVersion
GetSystemDirectoryW
LocalAlloc
lstrcmpW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
WTSGetActiveConsoleSessionId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
CreateEventW
CreateThread
MoveFileW
InitializeCriticalSectionAndSpinCount
Sleep
OpenMutexA
lstrlenW
GetProcessId
GetModuleHandleA
GetNativeSystemInfo
GetCurrentThreadId
CreateMutexW
FormatMessageA
OutputDebugStringA
ReleaseMutex
RegisterWaitForSingleObject
UnregisterWaitEx
SetThreadPriority
GetThreadPriority
IsDebuggerPresent
DuplicateHandle
GetUserDefaultLangID
TryEnterCriticalSection
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocalTime
QueryPerformanceFrequency
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
WaitForMultipleObjects
GlobalMemoryStatusEx
RtlCaptureStackBackTrace
QueueUserWorkItem
GetModuleHandleExA
GetProcessHeaps
HeapSetInformation
HeapUnlock
HeapLock
HeapWalk
GetProcessIoCounters
VirtualQueryEx
GetProcessTimes
GetSystemInfo
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
WriteConsoleW
SetStdHandle
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
FlushFileBuffers
SetFilePointerEx
ReadConsoleW
GetFileType
CreateSemaphoreW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
EncodePointer
AreFileApisANSI
ExitProcess
GetConsoleMode
GetConsoleCP
SetConsoleCtrlHandler
GetFileInformationByHandle
InitializeCriticalSectionEx
DeleteCriticalSection
DecodePointer
SystemTimeToFileTime
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetCurrentThread
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
OpenProcess
WaitForSingleObject
LocalFree
GetProcAddress
GetModuleHandleW
GetVersionExW
DeviceIoControl
SetLastError
SetFileAttributesW
GetLongPathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
SetEnvironmentVariableA
OutputDebugStringW
TzSpecificLocalTimeToSystemTime
LoadLibraryExA
GetFileAttributesExW
IsProcessorFeaturePresent
VirtualQuery
VirtualProtect
VirtualAlloc
RtlUnwind
user32
GetWindowLongW
EnumWindows
GetClassNameW
GetWindowThreadProcessId
GetWindowTextLengthW
WaitMessage
GetWindowTextW
PostMessageW
ExitWindowsEx
UnregisterClassW
GetDC
GetDesktopWindow
DestroyWindow
SetTimer
PostQuitMessage
KillTimer
GetQueueStatus
TranslateMessage
RegisterClassExW
CallMsgFilterW
PeekMessageW
MsgWaitForMultipleObjectsEx
CreateWindowExW
DefWindowProcW
DispatchMessageW
CharUpperW
GetKeyState
IsWindowEnabled
FindWindowW
SystemParametersInfoW
IsWindow
GetSystemMetrics
gdi32
DeleteObject
GetDeviceCaps
advapi32
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
RegNotifyChangeKeyValue
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
ConvertSidToStringSidW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyExW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
MapGenericMask
IsValidSecurityDescriptor
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
GetFileSecurityW
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
LookupPrivilegeValueW
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
SetThreadToken
ConvertStringSidToSidW
LookupAccountSidW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
IsValidSid
InitializeSid
InitializeAcl
GetSidSubAuthority
GetSidLengthRequired
GetLengthSid
GetAclInformation
GetAce
CopySid
AddAce
RegisterTraceGuidsW
shell32
SHGetKnownFolderPath
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetFolderPathA
ShellExecuteExW
CommandLineToArgvW
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
PropVariantClear
CoTaskMemFree
oleaut32
SysAllocString
SysStringLen
VariantClear
SysFreeString
shlwapi
SHStrDupW
StrToIntW
ord176
SHSetValueW
StrChrW
SHGetValueW
StrCmpNW
StrCmpNIW
PathRemoveFileSpecW
PathIsDirectoryW
PathGetDriveNumberW
PathFindExtensionW
PathAddBackslashW
PathFileExistsW
PathAppendW
StrRChrW
StrCmpIW
StrCpyNW
userenv
LoadUserProfileW
DestroyEnvironmentBlock
CreateEnvironmentBlock
UnloadUserProfile
mpr
WNetGetResourceInformationW
psapi
GetProcessMemoryInfo
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
QueryWorkingSet
netapi32
NetGetJoinInformation
NetApiBufferFree
winmm
timeBeginPeriod
timeGetTime
timeEndPeriod
Exports
Exports
GetHandleVerifier
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE