E:\r\ws\St_Make\code\build\win\results\standalone\Release\Win32\FlashPlayer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fapwall_0.9_-_OCTOBER.exe
Resource
win10v2004-20231215-en
General
-
Target
fapwall_0.9_-_OCTOBER.exe
-
Size
56.7MB
-
MD5
2f8574f6ad72015b557109ac6664d88b
-
SHA1
1f01c5513a5ab2ef147abbf0848ce86062a84122
-
SHA256
2299011b9ea7dd87cdea4968f45949633ac7c37c771578e27639c46b883655cc
-
SHA512
529f717530466283758da041cedda3e74f9dff422f8d825a87fc26ddf5e8ebd295b2f5667783684e0237a1abf69aa595bddc5872d44dcbb003a94f9896b49fcb
-
SSDEEP
1572864:mfipAHkNMaz/kWNc1HYRfDpUzhrB/Mx+Cl/LgDCBRZBH/3afEE7g6BsFrER:Qnlx+RrpUzhrB/C/dZYR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fapwall_0.9_-_OCTOBER.exe
Files
-
fapwall_0.9_-_OCTOBER.exe.exe windows:5 windows x86 arch:x86
Password: twteasdf
dd6a86d80fd8f29e61800e4c4b4f6a5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
CreateDirectoryW
RemoveDirectoryW
CreateFileA
CreateFileW
GetFileAttributesA
DeleteFileW
FindFirstFileW
CopyFileW
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
HeapSize
HeapLock
HeapUnlock
HeapWalk
DebugBreak
CreateThread
OpenThread
SetThreadPriority
QueueUserAPC
TlsAlloc
TlsFree
SleepEx
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
FreeLibrary
GetProcessTimes
GetCurrentProcess
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
LoadLibraryA
GetModuleHandleExW
SetCurrentDirectoryW
GetCurrentDirectoryW
QueryPerformanceCounter
QueryPerformanceFrequency
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
SetUnhandledExceptionFilter
FindNextFileW
GetCPInfo
IsDBCSLeadByte
VerSetConditionMask
LockResource
GlobalFree
ExitThread
LoadResource
CreateProcessA
FindResourceExA
FindResourceExW
GetSystemDirectoryA
GetFileAttributesW
MoveFileExW
GetVersionExW
VerifyVersionInfoW
GetUserDefaultUILanguage
GetUserDefaultLangID
GetLongPathNameW
GetFileInformationByHandle
GetFileSizeEx
DeviceIoControl
SetFilePointerEx
lstrlenW
CreateMutexA
CreateProcessW
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
OutputDebugStringA
GetTempPathA
GetTempFileNameA
GetSystemWow64DirectoryW
CreateDirectoryA
GetFullPathNameW
GetFileAttributesExW
DeleteFileA
GetVolumeInformationW
SetLastError
SetEvent
ResetEvent
GetStartupInfoW
GetTickCount
CreateEventW
GetSystemTime
GetTimeZoneInformation
SystemTimeToFileTime
GetCurrentThread
GetExitCodeThread
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
LCMapStringW
GetLocaleInfoW
TerminateThread
CreateWaitableTimerW
ReleaseSemaphore
CreateSemaphoreW
SetThreadAffinityMask
ReleaseMutex
CreateFileMappingA
CompareFileTime
IsDebuggerPresent
OutputDebugStringW
EncodePointer
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
LoadLibraryExA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
RtlUnwind
LoadLibraryExW
GetStdHandle
GetStringTypeW
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapReAlloc
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
ReadConsoleW
FormatMessageW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
GetEnvironmentVariableW
ReadConsoleA
SetConsoleMode
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
LoadLibraryW
TlsSetValue
TlsGetValue
GetSystemInfo
CloseHandle
FindClose
SetFilePointer
SetEndOfFile
ReadFile
WriteFile
GetFileSize
Sleep
WaitForSingleObject
DeleteCriticalSection
TryEnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
GetCurrentThreadId
SwitchToThread
RaiseException
GetExitCodeProcess
ExitProcess
CreateEventA
CreateSemaphoreA
GlobalMemoryStatusEx
SetSystemTime
FileTimeToSystemTime
GetVersionExA
ResumeThread
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
InterlockedExchangeAdd
GetVersion
VerifyVersionInfoA
GetProcessAffinityMask
GetNumberFormatW
GetCurrencyFormatW
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FreeLibraryAndExitThread
GetProcAddress
InterlockedCompareExchange
CreateTimerQueueTimer
DeleteTimerQueueTimer
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
WaitForMultipleObjects
DecodePointer
advapi32
CryptHashData
CryptImportKey
CryptGetHashParam
CryptSetKeyParam
CryptAcquireContextA
RegOpenKeyA
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
RegCloseKey
CryptEncrypt
Exports
Exports
IAEModule_AEModule_PutKernel
IAEModule_IAEKernel_LoadModule
IAEModule_IAEKernel_UnloadModule
_WinMainSandboxed@20
Sections
.text Size: 10.0MB - Virtual size: 10.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 825KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shockd Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 383KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 406KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ