D:\Git-repo\qb10frame_116_release\chrome\out\Release\uninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8aa4945b71a16b0d6dcbe9c5169f0e21470d010be70368d334f34974bd7761e4.exe
Resource
win7-20240903-en
General
-
Target
8aa4945b71a16b0d6dcbe9c5169f0e21470d010be70368d334f34974bd7761e4
-
Size
763KB
-
MD5
9850e40113081ebe639af61c572c89e5
-
SHA1
134f4c09754c32057df827f69bf0f669ded0eda2
-
SHA256
8aa4945b71a16b0d6dcbe9c5169f0e21470d010be70368d334f34974bd7761e4
-
SHA512
c21cbe7b3be1ad3662d163d69643bff61176fbed50dcb61d1090b10b958b13e0d1d3f8229cd69b9247ee4065cd35e755f23b19ef8842f1b73254462e9827f647
-
SSDEEP
12288:fi4yMg+q7QMcCxDuPIBvUHpx6XSLu98rgS2144jclEM8/bxSQC1DSuCjZPgjlgpt:64yMg+q7ECxDz4xQD8rgSi44jVM8NmSt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8aa4945b71a16b0d6dcbe9c5169f0e21470d010be70368d334f34974bd7761e4
Files
-
8aa4945b71a16b0d6dcbe9c5169f0e21470d010be70368d334f34974bd7761e4.exe windows:6 windows x86 arch:x86
debf3afba64448c8f115b2fc1f06c46f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
TerminateProcess
RemoveDirectoryW
CreateThread
GetWindowsDirectoryW
GetExitCodeProcess
CreateProcessW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExW
GetCurrentProcess
GetModuleHandleW
ChangeTimerQueueTimer
DeleteTimerQueueTimer
CreateTimerQueueTimer
DeleteTimerQueue
CreateTimerQueue
LocalFree
GetCommandLineW
GetCurrentProcessId
OpenProcess
CopyFileW
GetTickCount
GetTempPathW
MoveFileExW
GetModuleFileNameW
DeleteFileW
WaitForSingleObject
DecodePointer
LeaveCriticalSection
EnterCriticalSection
FindNextFileW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
lstrlenW
FindFirstFileW
GetFullPathNameW
SetLastError
FindClose
GetProcAddress
LoadLibraryW
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
ReadFile
GetFileSize
CreateFileW
CloseHandle
SetThreadContext
GetThreadContext
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
GetCurrentDirectoryW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetStdHandle
ExitProcess
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringEx
QueryPerformanceCounter
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
DeviceIoControl
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VerifyVersionInfoW
VerSetConditionMask
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
SetFilePointer
WriteFile
lstrcmpiW
ExpandEnvironmentStringsW
CreateEventW
GetLocalTime
GetShortPathNameW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetCurrentThreadId
CreateMutexW
OpenMutexW
GetSystemDefaultLangID
LocalAlloc
GlobalFree
ResumeThread
WritePrivateProfileStringW
SetEndOfFile
VirtualAlloc
VirtualFree
K32GetMappedFileNameW
OutputDebugStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
TerminateThread
GetSystemTimeAsFileTime
SetEvent
WaitForMultipleObjects
user32
UnregisterClassW
PostMessageW
IsWindow
ShowWindow
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyWindow
GetSysColor
InvalidateRect
CopyRect
IsWindowVisible
SendInput
GetForegroundWindow
SetForegroundWindow
EnumWindows
ClientToScreen
SetWindowRgn
UpdateLayeredWindow
IsZoomed
IsIconic
PostThreadMessageW
PeekMessageW
GetDesktopWindow
GetWindowDC
LoadStringW
CharUpperW
GetDlgItem
GetClassInfoExW
RegisterClassExW
RedrawWindow
PostQuitMessage
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
MapWindowPoints
SetWindowPos
MoveWindow
SetWindowTextW
CallWindowProcW
DefWindowProcW
SetWindowLongW
MessageBoxW
GetWindowThreadProcessId
OffsetRect
KillTimer
SetTimer
EqualRect
SendMessageW
SetCapture
ReleaseCapture
UnionRect
PtInRect
CreateWindowExW
GetCursorPos
ScreenToClient
IntersectRect
IsWindowEnabled
IsRectEmpty
BeginPaint
EndPaint
GetClientRect
EnumChildWindows
GetParent
DestroyIcon
SetRectEmpty
LoadImageW
SetCursor
LoadCursorW
GetWindowLongW
UpdateWindow
DrawFocusRect
GetDC
ReleaseDC
DrawTextW
FindWindowW
FindWindowExW
gdi32
GetCurrentObject
MoveToEx
LineTo
ExtTextOutW
SetBkColor
SetBitmapBits
GetBitmapBits
SetDIBColorTable
GetTextExtentExPointW
GetStockObject
TextOutW
GetTextExtentPoint32W
DeleteObject
SetBkMode
SetTextColor
SelectObject
CreateFontW
DeleteDC
CreateDIBSection
SetViewportOrgEx
CreateCompatibleDC
CreateFontIndirectW
GetObjectW
SaveDC
RestoreDC
BitBlt
GetViewportOrgEx
GetClipBox
RectVisible
SelectClipRgn
CreateRectRgnIndirect
CombineRgn
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
ConvertSidToStringSidW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
ole32
CoUninitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
PathRemoveBackslashW
PathRemoveBlanksW
PathCanonicalizeW
SHGetValueW
PathMatchSpecW
PathFindFileNameW
SHDeleteValueW
SHDeleteKeyW
PathIsDirectoryEmptyW
PathIsDirectoryW
PathIsRootW
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipGetImagePixelFormat
GdiplusStartup
GdipCreatePen1
GdipAlloc
GdipFree
GdipDeleteBrush
GdipDeleteGraphics
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImageHeight
GdipGetImageWidth
GdipCreateLineBrushFromRect
GdipFillRectangle
GdipGetImageGraphicsContext
GdipDrawImageI
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageRectRectI
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipResetWorldTransform
GdipDisposeImage
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromHBITMAP
GdipDrawLineI
GdipCreateFromHDC
GdipDeletePen
netapi32
NetApiBufferFree
NetWkstaTransportEnum
Netbios
psapi
GetProcessImageFileNameW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
htonl
htons
winhttp
WinHttpSendRequest
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpWriteData
WinHttpOpenRequest
WinHttpReadData
Sections
.text Size: 514KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE