f:\servers\security\SOURCES\fdwc\Release\fwsc.pdb
Behavioral task
behavioral1
Sample
fwsc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fwsc.dll
Resource
win10v2004-20240508-en
General
-
Target
fwsc.dll
-
Size
13KB
-
MD5
9f7c218922b9f7769481318324a3c0b2
-
SHA1
a1e53b7f364acabf022493c0db1210c99fa1541b
-
SHA256
f96c1f5a6d0c1713df7a5e329c7dbe8d07628514fb5d8b33d0b1970ae33beb96
-
SHA512
fa5700ac5af76eb58cc8e6b8399366ce58247dd797ad0af913409a93e626780202144184e2bd1808331da551d3c00dc1e11dc70d109710158d735f95feb4a994
-
SSDEEP
192:I/I/OiRQXaGnED1WqIkIE1iY0/Ic1+AMHhoUqkVucA8LBOxx:3/sqGSvPhiYoIcgA9YV+L
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fwsc.dll
Files
-
fwsc.dll.dll windows:5 windows x86 arch:x86
e4ef11da565d3fe2d2f8c45c92939e2a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntdll
RtlEqualString
LdrFindEntryForAddress
RtlEqualUnicodeString
LdrDisableThreadCalloutsForDll
RtlInitUnicodeString
LdrGetProcedureAddress
LdrGetDllHandle
RtlImageDirectoryEntryToData
ZwProtectVirtualMemory
_stricmp
strcmp
RtlUnwind
memcpy
ZwQueryVirtualMemory
memset
RtlReleasePebLock
RtlAcquirePebLock
RtlFreeHeap
RtlAllocateHeap
kernel32
GetCurrentThreadId
GetProcessHeap
user32
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExW
Exports
Exports
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 512B - Virtual size: 362B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ