h:\vssbuild\msp30\crrentcode1034\source\client\msc_emb\release\msc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a043b1d00492e8f02aaaf1e96689229705540b244ca17298e2c36dfee02c56a.dll
Resource
win7-20240708-en
General
-
Target
3a043b1d00492e8f02aaaf1e96689229705540b244ca17298e2c36dfee02c56a.exe
-
Size
532KB
-
MD5
a09612a1db6eafcd0ebc0ca8fd0ff39a
-
SHA1
3d091849229378a8a2249aaddcd2d2f5f7ca76ba
-
SHA256
3a043b1d00492e8f02aaaf1e96689229705540b244ca17298e2c36dfee02c56a
-
SHA512
bf9d185ca5580a891e61db117d951fbbc689c0d5303a7f23cf743962a1ff94e32b33c1ca998e2b09598672b76cc9ee5cf520f935d8dbc498f4e6a50ba7965657
-
SSDEEP
6144:GGWBzraceAqVUDZx+jFtE1k7F7JnIXaIhb3vZzLHM7FzRnBWf9/ZfF/f:G1BnKAqVc7+jFfBJIXVR07FzRS9/f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3a043b1d00492e8f02aaaf1e96689229705540b244ca17298e2c36dfee02c56a.exe
Files
-
3a043b1d00492e8f02aaaf1e96689229705540b244ca17298e2c36dfee02c56a.exe.dll windows:4 windows x86 arch:x86
47e57a5071fd75e61f1d975752e58f77
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSAGetLastError
htons
WSACleanup
recv
socket
__WSAFDIsSet
closesocket
send
getsockopt
ioctlsocket
connect
WSAStartup
select
inet_addr
inet_ntoa
getaddrinfo
freeaddrinfo
setsockopt
kernel32
GetLastError
SetEndOfFile
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSection
CloseHandle
SuspendThread
ResumeThread
CreateThread
Sleep
GetFileAttributesA
CreateDirectoryA
CopyFileA
DeleteFileA
GetTickCount
GetSystemTimeAsFileTime
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
WaitForSingleObject
SetEvent
CreateEventA
CreateMutexA
ReleaseMutex
GetLocalTime
MultiByteToWideChar
GetCurrentDirectoryA
GetModuleHandleExA
GetCurrentProcess
WideCharToMultiByte
GetCurrentProcessId
GetCurrentThreadId
GetVersionExA
HeapFree
HeapAlloc
GetCommandLineA
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetConsoleCP
GetConsoleMode
RtlUnwind
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
FlushFileBuffers
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Exports
Exports
MSPDownloadData
MSPLogin
MSPLogout
MSPSearch
MSPUploadData
QHCRDataWrite
QHCRFini
QHCRGetResult
QHCRInit
QHCRLogEvent
QHCRSessionBegin
QHCRSessionEnd
QISRAudioWrite
QISRFini
QISRGetParam
QISRGetResult
QISRGrammarActivate
QISRInit
QISRLogEvent
QISRSessionBegin
QISRSessionEnd
QISRUploadData
QISRWaveformRecog
QISVAudioWrite
QISVDownloadData
QISVFini
QISVGetResult
QISVInit
QISVSessionBegin
QISVSessionEnd
QISVUserEnroll
QISVUserIdentify
QISVUserUnenroll
QISVUserVerify
QTTSAudioGet
QTTSAudioInfo
QTTSFini
QTTSGetParam
QTTSInit
QTTSLogEvent
QTTSSessionBegin
QTTSSessionEnd
QTTSSynthToFile
QTTSTextPut
Sections
.text Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE