Q:\EA\FusionUser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
79c08535c45d36aa03720210a85fe417.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79c08535c45d36aa03720210a85fe417.dll
Resource
win10v2004-20231215-en
General
-
Target
79c08535c45d36aa03720210a85fe417
-
Size
156KB
-
MD5
79c08535c45d36aa03720210a85fe417
-
SHA1
5f721404397ad83ba8bb731b59f943dc38ad1f74
-
SHA256
bef14bfce41258ef7ac4c1f2636cd9505d0197b8b9f1411a1ca040f7fbd69708
-
SHA512
9313de8022ae859d1b3de64aea1aed3445dd258f2777d0a876b982d4528346e5f879dd59015c177fb386dd01a8f6f2be7dfa1b9ec4819b912216e6924e7a784c
-
SSDEEP
3072:wmul7Vv3B7ZNhPIFXVZ/H9444KD0KwOzzxsM0cEsU8kMoyZzaowURLn:Lul7VbN0VwOzzxsM0cEsU8kMoydavU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79c08535c45d36aa03720210a85fe417
Files
-
79c08535c45d36aa03720210a85fe417.dll windows:4 windows x86 arch:x86
dc51c3717ef1ed89c5e47f0edd867959
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
MapViewOfFile
OpenFileMappingA
GetModuleFileNameA
GlobalUnlock
GlobalLock
VirtualAlloc
VirtualFree
DeviceIoControl
GetCurrentProcessId
GlobalSize
CreateThread
lstrlenW
lstrcpyW
lstrcmpW
lstrlenA
lstrcmpA
GetProcAddress
LoadLibraryA
InitializeCriticalSection
OutputDebugStringA
GetModuleHandleA
LoadLibraryW
GlobalFree
WriteFile
CreateFileW
GlobalAlloc
SetFilePointer
CreateFileA
VirtualProtect
IsBadWritePtr
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
GetTimeZoneInformation
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
GetModuleHandleW
Sleep
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
ExitProcess
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapAlloc
VirtualQuery
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
UnhandledExceptionFilter
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
SetStdHandle
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
user32
wsprintfA
GetClipboardFormatNameW
SetWindowsHookExA
CallNextHookEx
GetWindowTextA
wsprintfW
GetActiveWindow
GetWindowTextW
gdi32
GetDIBits
CreateCompatibleBitmap
SelectObject
DeleteObject
GetCurrentObject
ole32
OleGetClipboard
ReleaseStgMedium
Exports
Exports
FusionHookFunction
InstallHook
StartupFusionUser
StartupLogon
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FusionU Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HookSec Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ