t:\onet\x86\ship\0\fpsrvutl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
750b2833f2078ce12821e4546a9faca38766060e8143b81b0c546e2816de41c8.dll
Resource
win7-20240221-en
General
-
Target
750b2833f2078ce12821e4546a9faca38766060e8143b81b0c546e2816de41c8
-
Size
2.1MB
-
MD5
de16da270143a2bce0b7a08f13b1c01d
-
SHA1
179a8159011f909873ae8415836f76c713506891
-
SHA256
750b2833f2078ce12821e4546a9faca38766060e8143b81b0c546e2816de41c8
-
SHA512
8cb4507dd430de140e9b5994e3e295ec3d25936de41cc2c8caa779b2b43bf0c96b51888d9447695b29926c4f539b923f6fbeac931ae097e928dfd87b1c1797e6
-
SSDEEP
49152:Qne9/dmj5cH9fzfwGpw154Khnf98Vh1mOeu4IOYU0QduBNKujF:n9/cqHxwew5BhCt5BNV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 750b2833f2078ce12821e4546a9faca38766060e8143b81b0c546e2816de41c8
Files
-
750b2833f2078ce12821e4546a9faca38766060e8143b81b0c546e2816de41c8.dll windows:4 windows x86 arch:x86
e30abf9176499f2b768b0d82a7e836d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
__clean_type_info_names_internal
_crt_debugger_hook
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
malloc
memcpy
qsort
iswalnum
wcschr
iswdigit
swscanf_s
iswxdigit
wcsspn
_wtoi
_malloc_crt
_encode_pointer
fwprintf_s
vsprintf_s
vswprintf_s
sprintf
_fileno
fflush
ferror
_wunlink
feof
ftell
fwrite
_waccess
_wfopen_s
wcscpy_s
_fstat64i32
_putenv
_tzset
_get_tzname
_get_timezone
_get_daylight
___mb_cur_max_func
mblen
_vsnwprintf
_vsnprintf
wcspbrk
__doserrno
towlower
_wfullpath
strrchr
_stricmp
wcsrchr
_endthreadex
_beginthreadex
exit
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
_set_error_mode
tolower
fopen_s
fclose
strerror_s
fgetc
fseek
fread
_getdrive
_wchmod
_chmod
memchr
bsearch
_CxxThrowException
realloc
_errno
atoi
_heapmin
_mbsrchr
_wcsicmp
printf
sscanf_s
wcscspn
strtok_s
memmove
srand
rand
_dupenv_s
memset
__CxxFrameHandler3
free
kernel32
GlobalMemoryStatusEx
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
GlobalMemoryStatus
VirtualProtect
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
EnumSystemCodePagesA
IsValidCodePage
WideCharToMultiByte
GetSystemTimeAsFileTime
GetTickCount
FreeLibrary
GetUserDefaultLangID
MoveFileW
DeleteFileW
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
CloseHandle
GetCurrentThread
InitializeCriticalSection
GetVersionExA
FormatMessageA
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindClose
SearchPathA
LoadLibraryA
GetModuleHandleA
GetProcAddress
UnmapViewOfFile
ReleaseMutex
SetEvent
WaitForSingleObject
CreateProcessA
GetModuleFileNameW
GetCurrentProcessId
DuplicateHandle
GetCurrentProcess
CreateMutexA
CreateEventA
MapViewOfFile
CreateFileMappingA
GetFileType
CreateFileW
GetUserDefaultLCID
GetFileAttributesA
GetModuleFileNameA
GetVolumeInformationA
GetTempPathA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetSystemTime
Sleep
SetLastError
GetFileSize
ReadFile
SetFilePointer
GetStdHandle
WriteFile
WriteConsoleW
WaitForMultipleObjects
GetSystemInfo
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
InitializeCriticalSectionAndSpinCount
HeapSetInformation
HeapCreate
HeapDestroy
HeapFree
HeapSize
HeapValidate
HeapAlloc
HeapReAlloc
HeapLock
HeapCompact
HeapUnlock
HeapWalk
RaiseException
QueryMemoryResourceNotification
DebugBreak
OutputDebugStringA
GetProcessHeap
CreateMemoryResourceNotification
ExpandEnvironmentStringsW
LoadLibraryW
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
CreateDirectoryA
CreateDirectoryW
CopyFileA
CopyFileW
DeleteFileA
GetDriveTypeW
RemoveDirectoryA
RemoveDirectoryW
GetSystemDirectoryA
GetSystemDirectoryW
GetVolumeInformationW
MoveFileA
MoveFileExW
SetFileTime
GetEnvironmentVariableW
GetTempFileNameA
GetTempFileNameW
LocalFree
GetDateFormatW
GetLocalTime
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
ResetEvent
CreateSemaphoreA
ReleaseSemaphore
DisableThreadLibraryCalls
MulDiv
WritePrivateProfileStringW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryA
SetCurrentDirectoryW
GetWindowsDirectoryA
SetThreadLocale
ResumeThread
TerminateThread
FileTimeToSystemTime
GetTimeFormatW
SetEndOfFile
GetFileTime
LoadLibraryExW
lstrlenW
QueryPerformanceFrequency
QueryPerformanceCounter
ExitProcess
LoadLibraryExA
LocalAlloc
MultiByteToWideChar
GetACP
user32
CharNextW
MessageBoxA
GetDesktopWindow
GetDC
ReleaseDC
FillRect
DrawTextW
DrawTextA
gdi32
DeleteDC
CreateCompatibleDC
SelectObject
CreateFontIndirectA
GetTextFaceA
DeleteObject
SetMapMode
CreateBitmap
SetBkMode
SetTextColor
CreateSolidBrush
GetDIBits
advapi32
RegQueryValueExW
GetSidLengthRequired
InitializeSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
IsValidSid
LookupAccountSidW
EqualSid
LookupAccountNameW
RegNotifyChangeKeyValue
RegGetKeySecurity
RegSetKeySecurity
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExW
RegEnumKeyExA
RegEnumValueW
RegEnumValueA
RegDeleteKeyW
RegDeleteKeyA
RegDeleteValueW
RegDeleteValueA
RegSetValueExW
RegCreateKeyExW
RevertToSelf
ImpersonateLoggedOnUser
RegisterEventSourceA
DeregisterEventSource
ReportEventA
GetFileSecurityA
RegOpenKeyExW
GetAce
CreateWellKnownSid
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
SetNamedSecurityInfoW
GetSecurityDescriptorDacl
GetLengthSid
CopySid
GetFileSecurityW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IsValidAcl
InitializeAcl
IsValidSecurityDescriptor
OpenThreadToken
GetSecurityDescriptorLength
GetAclInformation
DeleteAce
AddAce
Exports
Exports
?compareTo@RWCString@@QBEHABV1@W4caseCompare@1@@Z
?compareTo@RWCString@@QBEHPBDW4caseCompare@1@@Z
?index@RWCString@@QBEIPBDIIW4caseCompare@1@@Z
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 211KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 567KB - Virtual size: 568KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ