C:\cygwin\home\nightly\dev\FNP\Service\Build\_release-Windows-NT4-i686\FNPLicensingService.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
97d92c3ea5858b53f93b5c50809e6370N.exe
Resource
win7-20240705-en
General
-
Target
97d92c3ea5858b53f93b5c50809e6370N.exe
-
Size
715KB
-
MD5
97d92c3ea5858b53f93b5c50809e6370
-
SHA1
119707086775c62eb74f7971eb2e9f08776c96f9
-
SHA256
3c41e66817d3c9021e70c7bb548260e8788c2ff6547584120ee2d48007605893
-
SHA512
540a74d430d41be535aecd98d9b02c5d4cbce10a3fd21f589a9f9941e9aab4fa55f15cde31affe7f8fd2b7c9322de14249a84da46d5364b11f6a46c9e7e84a3e
-
SSDEEP
12288:5bwRyxUqsPi+JgmDeL3Cdm28UPlH2jXIN6EDfXKrmPfvvrFBjvrEH7G:5bw0guCd/8UPlWjTEDamfvfrEH7G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97d92c3ea5858b53f93b5c50809e6370N.exe
Files
-
97d92c3ea5858b53f93b5c50809e6370N.exe.exe windows:4 windows x86 arch:x86
0704409b0249a3b97c5f021bdd0d3db5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegDeleteKeyA
RegEnumKeyExA
QueryServiceConfigA
SetServiceStatus
RegDeleteValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
IsValidSid
CopySid
GetLengthSid
AddAce
InitializeAcl
GetAclInformation
MakeSelfRelativeSD
GetSecurityDescriptorControl
GetSecurityDescriptorLength
SetNamedSecurityInfoA
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
MakeAbsoluteSD
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
GetAce
GetNamedSecurityInfoA
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
kernel32
CloseHandle
DeviceIoControl
CreateFileA
ReadFile
SetFilePointer
GetLastError
GetVersionExA
WriteFile
GetSystemDirectoryA
QueryDosDeviceA
GetDriveTypeA
WaitForMultipleObjectsEx
SetWaitableTimer
CreateWaitableTimerA
CreateThread
WaitForSingleObjectEx
CreateMutexA
ReleaseMutex
FindClose
FindNextFileA
FindFirstFileA
CreateDirectoryA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
SetEvent
SuspendThread
ResumeThread
LeaveCriticalSection
EnterCriticalSection
GetOverlappedResult
DisconnectNamedPipe
ConnectNamedPipe
CreateEventA
OpenProcess
WaitForSingleObject
CreateNamedPipeA
InitializeCriticalSection
DeleteCriticalSection
GetTempPathA
GetCurrentProcessId
InterlockedExchange
GetACP
GetLocaleInfoA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
SetLastError
LocalFree
Sleep
OpenMutexA
GetLocalTime
GetTickCount
GetCurrentThreadId
GetFileAttributesA
GetFileAttributesExA
DeleteFileA
RemoveDirectoryA
MoveFileA
InterlockedCompareExchange
FormatMessageA
InterlockedDecrement
InterlockedIncrement
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetModuleHandleA
GetCommandLineA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
GetCPInfo
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
QueryPerformanceCounter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetOEMCP
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
user32
wsprintfA
Sections
.text Size: 441KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ