C:\Users\sanyk\source\repos\Femboyware\x64\Debug\Femboyware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Femboyware.dll
Resource
win10v2004-20240226-en
General
-
Target
Femboyware.dll
-
Size
1.8MB
-
MD5
e9422e47a33f2b5cf88a9520cc453bf3
-
SHA1
3c196abf4ce15454eb682ac701a6e507e5cf7252
-
SHA256
1d1f0fd036b77f02cd54ef00e7b046a18ed3a86e55bfa735fd16054ac2df3fbd
-
SHA512
d44e80b40f0dafb94f086d421cac757eeaaf2c1aa0c96fb639449c2d18f7e8afefc39133eadb29fdc33aab8aac3b732f81aa52f58272f4066ceded99146cd414
-
SSDEEP
24576:uZsrJ/zvM2e0AOAFZWe0rs3aHtygefDOi1GoRym6d/ReKn1:Dhbrs3+XefDlYm6d/Nn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Femboyware.dll
Files
-
Femboyware.dll.dll windows:6 windows x64 arch:x64
836e87614e89d4d6ff56393a586ecd55
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleW
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
CreateToolhelp32Snapshot
Thread32First
Thread32Next
MultiByteToWideChar
FreeLibrary
LocalFree
K32EnumProcessModules
CreateThread
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetProcessHeap
GetLastError
GetStartupInfoW
RaiseException
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GlobalFree
GlobalLock
GetModuleHandleA
QueryPerformanceFrequency
QueryPerformanceCounter
VerSetConditionMask
LocalAlloc
WideCharToMultiByte
GlobalUnlock
OpenProcess
GlobalAlloc
user32
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassW
GetAsyncKeyState
SetProcessDPIAware
MonitorFromWindow
GetSystemMetrics
OpenClipboard
CloseClipboard
SetClipboardData
CallWindowProcW
SetWindowLongPtrW
DefWindowProcW
ScreenToClient
ClientToScreen
GetCursorPos
SetCursor
LoadCursorW
SetCursorPos
GetClientRect
GetClipboardData
TrackMouseEvent
ReleaseDC
GetDC
GetForegroundWindow
IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
GetKeyState
EmptyClipboard
gdi32
GetDeviceCaps
CreateRectRgn
DeleteObject
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetContext
d3dcompiler_47
D3DCompile
dwmapi
DwmGetColorizationColor
DwmEnableBlurBehindWindow
DwmIsCompositionEnabled
msvcp140d
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140d
__std_type_info_destroy_list
__vcrt_LoadLibraryExW
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
__C_specific_handler_noexcept
__current_exception_context
__current_exception
__C_specific_handler
_CxxThrowException
__std_exception_destroy
__std_exception_copy
strstr
memset
memcpy
memcmp
memchr
strchr
memmove
vcruntime140_1d
__CxxFrameHandler4
ucrtbased
strncmp
toupper
cosf
floorf
sinf
acosf
ceilf
atof
log
pow
atan2f
logf
powf
calloc
_invalid_parameter
strtoul
_CrtDbgReport
terminate
_CrtDbgReportW
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
sqrtf
_crt_at_quick_exit
_cexit
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_callnewh
_initterm
_initterm_e
_free_dbg
_wmakepath_s
_wsplitpath_s
wcscpy_s
fmodf
__stdio_common_vsprintf
__stdio_common_vfprintf
fwrite
ftell
fseek
fread
fflush
fclose
_wfopen
__acrt_iob_func
_wassert
strncpy
strlen
strcmp
fabs
qsort
malloc
__stdio_common_vsscanf
_crt_atexit
free
strcpy
Sections
.textbss Size: - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 378KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ