D:\qci_workspace\root-workspaces\__qci-pipeline-10989745-2\Basic\Output\BinFinal\QQPCRTP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f.exe
Resource
win10v2004-20241007-en
General
-
Target
5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f
-
Size
1.5MB
-
MD5
e81a82f2323213fc61c65baec24b0a86
-
SHA1
af82f2a72e64086eb337b1f522e97f5f7ed3308a
-
SHA256
5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f
-
SHA512
e10f3efbb0a15d241685db510f84ec75e0732fbdccc37e41097809b807ce6be7ae96fcbfe2e914dbdaec54549465f6bb4bb3ef3f745768b803a1a512c149bc82
-
SSDEEP
24576:xaZw9yTDgrK/zNedAS4BXgTZ/gSfJlnnC47n9avzFl6dikc1H2ZRezGp2JruqYfX:j9pK/zeASHFXHnrML6dikc1H2ZRpkuR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f
Files
-
5bb37136753a57dd2f6b120fab9e66822fa96949fdbe89388a986a3ff0ca002f.exe windows:6 windows x86 arch:x86
2e1738f1c0539380b62dfe540512939e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
htons
htonl
ntohs
ntohl
kernel32
InitializeSListHead
IsProcessorFeaturePresent
WaitForSingleObjectEx
GetSystemPowerStatus
GetNativeSystemInfo
GetSystemDefaultLangID
MapViewOfFileEx
lstrlenW
GetTimeFormatW
GetDateFormatW
GetCurrencyFormatW
GetNumberFormatW
GetLocaleInfoW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSectionEx
GetLastError
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
SetLastError
TerminateProcess
GetModuleFileNameW
OpenProcess
CreateToolhelp32Snapshot
ProcessIdToSessionId
Sleep
Process32NextW
Process32FirstW
CloseHandle
VerSetConditionMask
ReadProcessMemory
GetCurrentProcessId
GetModuleHandleW
VerifyVersionInfoW
OpenMutexW
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
ReadFile
SizeofResource
HeapFree
EnterCriticalSection
VirtualFree
GetCurrentProcess
WriteFile
VirtualAlloc
LeaveCriticalSection
SetFilePointer
CreateFileW
GetVersionExW
HeapSize
OutputDebugStringW
GetCurrentThread
LockResource
DeleteFileW
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
GetProcessHeap
SetThreadPriority
GetThreadPriority
UnhandledExceptionFilter
DeviceIoControl
GetVersion
ExitProcess
FreeLibrary
GetTickCount64
GetSystemInfo
GlobalMemoryStatusEx
QueryPerformanceFrequency
CreateMutexW
GetSystemDirectoryW
IsDebuggerPresent
WaitForMultipleObjects
GetProcessId
WTSGetActiveConsoleSessionId
GetExitCodeProcess
GetModuleHandleExW
GetCurrentThreadId
FormatMessageW
LocalFree
CreateTimerQueueTimer
ExpandEnvironmentStringsW
OpenEventW
ReleaseMutex
SleepEx
GetSystemTimeAsFileTime
DeleteTimerQueueTimer
GetTickCount
GetProcessTimes
LoadLibraryExW
SetConsoleCtrlHandler
MoveFileExW
CreateProcessW
CopyFileW
CreateThread
lstrcmpiW
VirtualQuery
VirtualProtect
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
SuspendThread
LoadLibraryA
SetProcessWorkingSetSize
GetCommandLineA
GetProcessHandleCount
GetProcessIoCounters
lstrcpynW
SetErrorMode
InitializeCriticalSection
SearchPathW
IsBadReadPtr
IsBadWritePtr
SetUnhandledExceptionFilter
WriteProcessMemory
GetCommandLineW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
SwitchToThread
UnmapViewOfFile
CreateFileMappingW
WideCharToMultiByte
GetFileAttributesW
FindFirstFileW
SystemTimeToFileTime
FindNextFileW
FindClose
GetTempPathW
QueryPerformanceCounter
user32
SetWindowPos
GetGuiResources
MsgWaitForMultipleObjects
PeekMessageW
GetMessageW
CreateDialogParamW
GetWindowRect
TranslateMessage
SendMessageW
GetSystemMetrics
ShowWindow
DispatchMessageW
SetFocus
GetDlgItem
advapi32
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
RegSetValueExW
RegCloseKey
OpenTraceW
ControlTraceW
CloseTrace
ProcessTrace
StartTraceW
DuplicateTokenEx
RegQueryInfoKeyW
RegSetKeySecurity
RegGetKeySecurity
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegFlushKey
RegisterServiceCtrlHandlerExW
CreateServiceW
RegDeleteKeyW
SetServiceStatus
ChangeServiceConfig2W
DeleteService
StartServiceCtrlDispatcherW
QueryServiceStatus
RegCreateKeyExW
StartServiceW
RegDeleteValueW
SetTokenInformation
ImpersonateLoggedOnUser
CloseServiceHandle
OpenSCManagerW
ControlService
OpenServiceW
QueryServiceStatusEx
LookupPrivilegeValueW
CreateProcessAsUserW
GetTokenInformation
shell32
CommandLineToArgvW
ole32
CoUninitialize
CoInitialize
shlwapi
PathAddBackslashW
PathAppendW
PathRemoveFileSpecW
PathStripPathA
PathFileExistsW
StrStrIW
StrFormatByteSizeW
StrFormatKBSizeW
StrFromTimeIntervalW
SHGetValueW
psapi
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
GetProcessMemoryInfo
GetModuleBaseNameW
Sections
.text Size: 336KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 154KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ