AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
FuhDsBitchAsleep.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FuhDsBitchAsleep.exe
Resource
win10v2004-20240426-en
Target
FuhDsBitchAsleep.exe
Size
7.1MB
MD5
c2242b939f1c6fbfa6f8c98a84791f15
SHA1
28283bb2d6283bfc876349f976df2abb693d326c
SHA256
64e525cd85fe662e3852c60823038bffba31a7941846649a0c46f1a81aba9017
SHA512
b1b5d80b72e6e5b616fd2dfd3b593510005b7af6fb4053c5cb69806f3c57fefca6e61a8e60e24771046a0bef72130de8bfcb5195cd2954f62d9996a62174d84b
SSDEEP
196608:dmEaEo9gL+CmJyFoci1e5ExvMUpmKEPm6BJ2RxjNR6KBNc:sERo9gLisFa054vMUxEPlBJsjz6k
Checks for missing Authenticode signature.
resource |
---|
FuhDsBitchAsleep.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D3D11CreateDevice
RtlCaptureContext
getsockopt
CertFreeCertificateChain
CryptHashData
LoadLibraryExW
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetClipboardData
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
CoSetProxyBlanket
SysAllocString
ImmSetCandidateWindow
D3DCompile
BCryptGenRandom
WTSSendMessageW
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ