Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericFCA.Agent.96092.1603.15044.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericFCA.Agent.96092.1603.15044.exe
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.Trojan.GenericFCA.Agent.96092.1603.15044.exe
-
Size
2.1MB
-
MD5
a8ef00b6bc7147349bebc950a5fed0f9
-
SHA1
3d3f2418ab0327d7271c7566001aa49c4b9ba0b9
-
SHA256
90dd210c9c67ffa0ecd9a20c1b76d0ecd2ee8669804d736b44a530ab818baec6
-
SHA512
8c638a0469324e40c4097742b151f18559bd7ff8bb2e4b3488e3fe07ffc6d64d9651c104fcdaf27ca987042b8c0505ad6e2415c65f375bd8c90a0d8225d409b5
-
SSDEEP
24576:y/DYhIWSd6DHp4kzkCIw23i5pQduTLahpR2/ul/yoGVNY58bIEzW+/m/rF7k:k76DOkAtw2QpsuHSp4ul/yow7zWYN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.GenericFCA.Agent.96092.1603.15044.exe
Files
-
SecuriteInfo.com.Trojan.GenericFCA.Agent.96092.1603.15044.exe.exe windows:4 windows x86 arch:x86
a9b8f84ed7e3b395834ca51370b2661f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
bind
setsockopt
socket
gethostname
WSASetLastError
WSAStartup
htons
send
getsockopt
connect
gethostbyaddr
inet_ntoa
htonl
sendto
select
recv
WSAGetLastError
WSACleanup
closesocket
gethostbyname
ssleay32
ord183
ord96
ord48
ord8
ord172
ord12
ord75
ord87
ord43
ord108
ord78
kernel32
TlsGetValue
lstrcpynA
GlobalFlags
WritePrivateProfileStringA
GetCurrentDirectoryA
GetLastError
GetProcessVersion
GetThreadLocale
GetCPInfo
GetOEMCP
SetErrorMode
DuplicateHandle
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DeleteFileA
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSize
GetFileTime
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetFileType
GetSystemTimeAsFileTime
HeapFree
GetDriveTypeA
LocalReAlloc
RemoveDirectoryA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetACP
SetStdHandle
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GetTickCount
FormatMessageA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
GetProfileStringA
CreateThread
MoveFileA
SetCurrentDirectoryA
GetModuleFileNameA
GlobalFree
GlobalAlloc
LocalSize
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
GlobalLock
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetWindowsDirectoryA
MultiByteToWideChar
CreateDirectoryA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetVersionExA
lstrcpyA
CreateProcessA
lstrlenA
GetExitCodeThread
GetExitCodeProcess
TerminateThread
CloseHandle
LocalAlloc
LocalFree
FindResourceA
LoadResource
SizeofResource
LockResource
Sleep
FindNextFileA
user32
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
WindowFromPoint
DestroyMenu
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
InvalidateRect
CharUpperA
InflateRect
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
GetWindowDC
RemovePropA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
GetActiveWindow
ValidateRect
IsWindowVisible
GetCursorPos
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
PostQuitMessage
ShowWindow
DestroyIcon
SetTimer
AppendMenuA
RemoveMenu
CallNextHookEx
LoadIconA
LoadBitmapA
GetWindowRect
GetForegroundWindow
MessageBoxA
GetKeyState
TranslateMessage
DispatchMessageA
PeekMessageA
GetDlgItem
EnableWindow
LoadCursorA
SetCursor
GetMenuState
GetMenu
DrawMenuBar
ModifyMenuA
PostMessageA
SetWindowsHookExA
UnhookWindowsHookEx
IsIconic
GetClientRect
DrawIcon
ScreenToClient
SendMessageA
GetSystemMetrics
LoadImageA
GetDesktopWindow
CopyRect
ReleaseDC
GetDC
ClientToScreen
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
DrawFocusRect
GetDlgItemInt
CheckRadioButton
CheckDlgButton
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
CallWindowProcA
IsWindowUnicode
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
GetMenuCheckMarkDimensions
gdi32
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SaveDC
IntersectClipRect
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
CreateSolidBrush
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
oledlg
ord8
ole32
CLSIDFromProgID
CoGetClassObject
CLSIDFromString
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OleInitialize
OleUninitialize
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoCreateInstance
olepro32
ord253
oleaut32
SysAllocStringByteLen
SysAllocString
VariantChangeType
VariantCopy
SysStringLen
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ