C:\Users\divynslin\Desktop\MY_PCNB\Forte_SVN\HookTest_code\HookTest_1_0_0_15\x64\Release\fmapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3fac9520fa5b09cb82215f50a157c003a1a12cffc9345c857f27fe8f204f960e.exe
Resource
win7-20231129-en
General
-
Target
3fac9520fa5b09cb82215f50a157c003a1a12cffc9345c857f27fe8f204f960e
-
Size
1.4MB
-
MD5
ed00cba7b1a1798f4596ac52d980d701
-
SHA1
ba846da4b9cb4ce357f575215b690a7e5b3ca953
-
SHA256
3fac9520fa5b09cb82215f50a157c003a1a12cffc9345c857f27fe8f204f960e
-
SHA512
fffa313caf951333bcb4a78fb64ef7a519d01467eef81204208f766b60be36bbac50ef9f15bce4fe2c41b7132fb7a6046ba27ad8fa77f50b4f68190d269c3a7a
-
SSDEEP
12288:XxMNR4U0ZwXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kw:bVwsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fac9520fa5b09cb82215f50a157c003a1a12cffc9345c857f27fe8f204f960e
Files
-
3fac9520fa5b09cb82215f50a157c003a1a12cffc9345c857f27fe8f204f960e.exe windows:6 windows x64 arch:x64
2879fbd82165ab01e030f61bac9b5434
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapReAlloc
RaiseException
HeapAlloc
DeleteCriticalSection
GetProcessHeap
OutputDebugStringW
ReadFile
FindFirstFileW
EnterCriticalSection
FindNextFileW
lstrlenW
TerminateProcess
LeaveCriticalSection
InitializeCriticalSection
FindClose
LocalAlloc
CreateFileW
OpenFileMappingW
GetSystemDirectoryW
UnmapViewOfFile
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
GlobalAlloc
DeleteFileW
GetLastError
GlobalFree
CloseHandle
CreateThread
GetWindowsDirectoryW
GetFileSize
GetModuleHandleW
MapViewOfFile
lstrcmpW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
HeapSize
InitializeCriticalSectionEx
Process32FirstW
HeapFree
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
CreateEventW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
user32
SetTimer
UnregisterClassW
PostQuitMessage
KillTimer
GetMessageW
DefWindowProcW
DestroyWindow
SetWindowsHookExW
CallNextHookEx
GetSystemMetrics
RegisterClassExW
DispatchMessageW
CreateWindowExW
wvsprintfW
UnhookWindowsHookEx
TranslateMessage
FindWindowW
LoadCursorW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ole32
PropVariantClear
CoCreateInstance
CoInitialize
CoUninitialize
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
shlwapi
StrStrIW
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE