DfrgFat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d.exe
Resource
win10v2004-20240426-en
General
-
Target
0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d
-
Size
107KB
-
MD5
513be83a9525ad120ca5600f222e6d37
-
SHA1
722cb3428f26012f1db98cb629fff86bc4d05137
-
SHA256
0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d
-
SHA512
e6a2ec7d5e74e0788b6f7df29698a47fe6bbfe81308000cbfba56a8b94dc3a671a44d358a0aa68b092cb40e53af7273d7e9028ae1212ba1cd380a4dfba69b530
-
SSDEEP
3072:3E9cKL+9ZUlsKjUHZTzLRKfmALVti7kZ15o/s:3E9rL+ffgwN/RKZZL5o/s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d
Files
-
0dc9afdf13c33e6ef1c0a8ee1c54bbafd808f868b9a546c3b783b69a3ea6921d.exe windows:5 windows x86 arch:x86
eb0eff780527e323c357000cfe6b7c4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
swscanf
iswctype
_ftol
_wcsupr
_wcsicmp
_fmode
_wfopen
fgetws
fclose
wcscmp
localeconv
atoi
sprintf
towupper
wcsstr
swprintf
_local_unwind2
wcscat
wcsrchr
wcschr
wcscspn
wcsncmp
wcsncat
wcscpy
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
wcsncpy
_wtoi
_except_handler3
advapi32
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeValueW
OpenProcessToken
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
kernel32
WideCharToMultiByte
FlushFileBuffers
SetFilePointer
OutputDebugStringA
GetLocalTime
SystemTimeToFileTime
LocalFree
SetErrorMode
DeviceIoControl
GlobalHandle
GetFileAttributesExW
GetFileInformationByHandle
GetExitCodeThread
GetComputerNameW
OpenEventW
ExitThread
SetEvent
GetCommandLineW
CreateThread
GetSystemPowerStatus
GetVersionExW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
SetLastError
ReadFile
WriteFile
InterlockedIncrement
InterlockedDecrement
Sleep
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcpyW
GetFileSize
CreateFileW
ReleaseMutex
lstrcatW
FormatMessageW
GetCurrentThreadId
lstrlenW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
lstrcpynW
SizeofResource
FindResourceW
lstrcmpiW
CompareStringW
ExpandEnvironmentStringsW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
GetSystemWindowsDirectoryW
gdi32
GetStockObject
user32
LoadStringW
CharUpperW
wvsprintfA
SendMessageW
DefWindowProcW
MessageBoxW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
PostQuitMessage
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
PostMessageW
wsprintfW
ntdll
NtQueryInformationFile
NtFsControlFile
NtQueryVolumeInformationFile
NtWaitForSingleObject
comctl32
ord17
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoUninitialize
CoCreateInstanceEx
CLSIDFromString
CoRegisterClassObject
ReleaseStgMedium
CoInitializeEx
vssapi
ord5
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE