TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
DiskFucker.exe
Resource
win7-20240221-en
Target
DiskFucker.exe
Size
242KB
MD5
c474b4841db959b842a5ef56faca24c3
SHA1
1ed59a2a4ee3df36158ad7027e08a7a3dd7bd984
SHA256
f92f6228c31d0db3fb066b4f1041a5ba2bbfc42c8ae6b5b2f129d3c85c07ee9c
SHA512
1af52c8094bec782f8f3c6c91e2765687b7dab6f2976c711acc7b09ed8a5ebd5b0674293ad0cb4dbcc5f3a77fdf2c01c39ce083da9d12c464dd2c4165f727758
SSDEEP
6144:kaSUs3R3EoKUAkPdCtPJwfwIM1HzTsUUNVPI8mr8y:RJMEoK3kPdPfi1HzQUUDKrF
Checks for missing Authenticode signature.
resource |
---|
DiskFucker.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleHandleA
GetProcAddress
ShellExecuteW
VerQueryValueW
CharNextW
VariantCopy
NetWkstaGetInfo
RegLoadKeyW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE