DriverProc
Static task
static1
Behavioral task
behavioral1
Sample
F264vfw.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
F264vfw.dll
Resource
win10v2004-20240508-en
General
-
Target
F264vfw.dll
-
Size
48KB
-
MD5
f64292b1bc0c2a7b60b998d8d4364d03
-
SHA1
0075d504d60f4a6d51319edabfb3a24c6357298c
-
SHA256
9d22d30ce19b00bad1ffff2703ffee0f5e3e1f93555be156c8b0a1b378023df8
-
SHA512
a556ff442e45ebe389eb1a9f61057d50d43e0004f0e497adb438cee5706d655c18bd46b8e09ae80d78e08415f8a74ed3fd42716c4445726795a2808fcc7f0e0d
-
SSDEEP
384:7hR8H3S3fwhpZd3OK5aIzDOW9Ih+8aCRj0pYyBCJZl5pxdbHH0uo9cq5vpx:BfOeeNIhRtmpY4g1HXo9pv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource F264vfw.dll
Files
-
F264vfw.dll.dll windows:4 windows x86 arch:x86
fd847f5e76ba897fefed725648e5f062
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
DefDriverProc
kernel32
TerminateProcess
RtlUnwind
GetStringTypeW
GetStringTypeA
GetProcAddress
LoadLibraryA
FreeLibrary
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ