C:\Users\divynslin\Desktop\MY_PCNB\Forte_SVN\HookTest_code\HookTest_1_0_0_15\x64\Release\fmapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f64dcfdfe97736abb7214a30f431539989739d42700a40732c7167cd1daa976b.exe
Resource
win7-20240221-en
General
-
Target
f64dcfdfe97736abb7214a30f431539989739d42700a40732c7167cd1daa976b
-
Size
1.4MB
-
MD5
c3339582a8629cc6f034c452d3fe8195
-
SHA1
64096ef3db7d512ec711c561b05df633b359ea91
-
SHA256
f64dcfdfe97736abb7214a30f431539989739d42700a40732c7167cd1daa976b
-
SHA512
b55c70918284fe259109556768fc537bb060b903b17d3ac552564ce3bf8c660e62ccfda611e443fa1ac8b4a4fa7ec136a4bd485829193c7742c3114d5bf3fa8d
-
SSDEEP
12288:ExMNR4U0ZwXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kw:gVwsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f64dcfdfe97736abb7214a30f431539989739d42700a40732c7167cd1daa976b
Files
-
f64dcfdfe97736abb7214a30f431539989739d42700a40732c7167cd1daa976b.exe windows:6 windows x64 arch:x64
2879fbd82165ab01e030f61bac9b5434
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapReAlloc
RaiseException
HeapAlloc
DeleteCriticalSection
GetProcessHeap
OutputDebugStringW
ReadFile
FindFirstFileW
EnterCriticalSection
FindNextFileW
lstrlenW
TerminateProcess
LeaveCriticalSection
InitializeCriticalSection
FindClose
LocalAlloc
CreateFileW
OpenFileMappingW
GetSystemDirectoryW
UnmapViewOfFile
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
GlobalAlloc
DeleteFileW
GetLastError
GlobalFree
CloseHandle
CreateThread
GetWindowsDirectoryW
GetFileSize
GetModuleHandleW
MapViewOfFile
lstrcmpW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
HeapSize
InitializeCriticalSectionEx
Process32FirstW
HeapFree
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
CreateEventW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
user32
SetTimer
UnregisterClassW
PostQuitMessage
KillTimer
GetMessageW
DefWindowProcW
DestroyWindow
SetWindowsHookExW
CallNextHookEx
GetSystemMetrics
RegisterClassExW
DispatchMessageW
CreateWindowExW
wvsprintfW
UnhookWindowsHookEx
TranslateMessage
FindWindowW
LoadCursorW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ole32
PropVariantClear
CoCreateInstance
CoInitialize
CoUninitialize
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
shlwapi
StrStrIW
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE