faultrep.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Faultrep.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Faultrep.dll
Resource
win10v2004-20240426-en
General
-
Target
Faultrep.dll
-
Size
313KB
-
MD5
1e8d06aae74fed674c1156b3fea911c2
-
SHA1
424d4acd2401d6fd9d5b12eca2e792055765e688
-
SHA256
c1999ba9e436f9e0b9302dc82df8b214e66372899fd4c0c60c56ee5340badb9f
-
SHA512
f2d9d2586274b0f6a2669cf3c1c7cea40fbf24930c94cda509a2a347bef036944b04dba364206a6289af5af255824cc1bb83b108527181f04a5c42573c7d6cd3
-
SSDEEP
6144:iPCyi98kBUmp4LNYJwVA7PPoRu3lhQVJyB60OHyLC7vQ:ENi9LWxYPLPMu1Oc2Hywo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Faultrep.dll
Files
-
Faultrep.dll.dll windows:6 windows x86 arch:x86
40b480cb4f1cfb6d61abb86c01a4850d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_CxxThrowException
isspace
tolower
towlower
rand
srand
memcpy
time
wcsstr
??1type_info@@UAE@XZ
?terminate@@YAXXZ
wcschr
memmove
_vscwprintf
__CxxFrameHandler3
wcsncmp
_vsnprintf
iswspace
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
_amsg_exit
_initterm
free
malloc
_XcptFilter
_wcsnicmp
wcsrchr
_vsnwprintf
_wcsicmp
_wtoi
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
ntdll
DbgPrint
RtlAllocateHeap
NtSetSystemInformation
RtlAdjustPrivilege
RtlCompareMemory
NtSystemDebugControl
RtlGetUnloadEventTraceEx
NtQueryInformationThread
RtlImageNtHeaderEx
EtwTraceMessage
NtSuspendProcess
NtResumeProcess
RtlCreateProcessReflection
RtlWerpReportException
NtClearEvent
RtlDecodeSystemPointer
RtlReleasePebLock
NtQuerySystemInformation
RtlDetermineDosPathNameType_U
RtlGetCurrentTransaction
RtlSetCurrentTransaction
NtWaitForMultipleObjects
NtOpenKey
RtlInitUnicodeStringEx
NtQueryValueKey
RtlTryAcquirePebLock
WinSqmAddToStream
NtQueryInformationProcess
RtlAllocateAndInitializeSid
RtlInitUnicodeString
NtAlpcConnectPort
NtAlpcSendWaitReceivePort
RtlFreeSid
NtOpenEvent
NtWaitForSingleObject
EtwEventWriteNoRegistration
RtlNtStatusToDosError
WinSqmIncrementDWORD
RtlUpcaseUnicodeChar
NtGetNextThread
NtSuspendThread
NtResumeThread
ShipAssert
NtClose
RtlFreeHeap
kernel32
LocalAlloc
GetTickCount
GetSystemTimeAsFileTime
lstrlenW
DeleteFileW
WriteFile
GetCurrentProcessId
GetFileSizeEx
CreateFileW
FlushFileBuffers
QueryFullProcessImageNameW
CheckRemoteDebuggerPresent
DisableThreadLibraryCalls
DelayLoadFailureHook
FreeLibrary
LoadLibraryExA
InterlockedExchange
Sleep
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentThreadId
OpenProcess
WerGetFlags
MapViewOfFile
OpenThread
GetThreadContext
GetCurrentProcess
TerminateProcess
GetProcAddress
WaitForSingleObject
GetThreadId
GetApplicationRecoveryCallback
InterlockedCompareExchange
UnmapViewOfFile
IsWow64Process
GetProcessId
SetErrorMode
CreateProcessW
LocalFree
CloseHandle
GetLastError
DuplicateHandle
GetThreadPriority
SetThreadPriority
VirtualQueryEx
K32GetMappedFileNameW
CopyFileExW
GetExitCodeProcess
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FindFirstFileNameW
FindNextFileNameW
GetDriveTypeW
GetLogicalDriveStringsW
QueryDosDeviceW
GlobalMemoryStatus
K32EnumProcessModules
K32GetModuleFileNameExW
OpenEventW
RegDeleteValueW
GetTempFileNameW
GetTempPathW
GetLongPathNameW
GetCurrentThread
SetFileAttributesW
OutputDebugStringA
GetModuleHandleW
VirtualFree
VirtualAlloc
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
CreateEventW
CreateMutexW
InterlockedIncrement
InterlockedDecrement
ReadProcessMemory
SetEvent
CreateRemoteThread
WaitForMultipleObjects
CompareStringW
LCMapStringW
SetLastError
GetSystemInfo
GetSystemDirectoryW
GetSystemWow64DirectoryW
CreateFileMappingW
Thread32Next
Thread32First
CreateToolhelp32Snapshot
CloseThreadpoolWait
WaitForThreadpoolWaitCallbacks
SetThreadpoolWait
CreateThreadpoolWait
CreateThread
MultiByteToWideChar
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryW
FindClose
FindFirstFileW
SystemTimeToFileTime
GetSystemTime
FindNextFileW
OpenMutexW
FreeLibraryAndExitThread
GetExitCodeThread
GetModuleHandleExW
LoadLibraryExW
Process32NextW
Process32FirstW
GetVersionExW
SearchPathW
CreateDirectoryW
GetUserDefaultUILanguage
GetProcessTimes
SetEnvironmentVariableW
Module32NextW
Module32FirstW
RegQueryValueExW
advapi32
MD5Final
MD5Update
MD5Init
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
DuplicateToken
CopySid
IsValidSid
DeregisterEventSource
ReportEventW
RegisterEventSourceW
CloseServiceHandle
UnregisterTraceGuids
GetServiceDisplayNameW
OpenSCManagerW
OpenThreadToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSetKeyValueW
EventRegister
EventWrite
EventUnregister
RegDeleteKeyW
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegGetValueW
OpenProcessToken
ImpersonateLoggedOnUser
CreateProcessAsUserW
RevertToSelf
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
TraceMessage
user32
IsWindow
GetDesktopWindow
GetWindowThreadProcessId
RegisterErrorReportingDialog
GetThreadDesktop
GetUserObjectInformationW
GetSystemMetrics
GetProcessWindowStation
LoadStringW
rpcrt4
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
CStdStubBuffer_Disconnect
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_CountRefs
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_DebugServerRelease
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
Exports
Exports
AddERExcludedApplicationA
AddERExcludedApplicationW
CancelHangReporting
CheckPerUserCrossProcessThrottle
DllCanUnloadNow
DllGetClassObject
ReportFault
ReportHang
UpdatePerUserLastCrossProcessCollectionTime
WerReportHang
WerpInitiateCrashReporting
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ