D:\a\WidescreenFixesPack\WidescreenFixesPack\data\TheSaboteur.FusionFix\scripts\TheSaboteur.FusionFix.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c.dll
Resource
win10v2004-20240709-en
General
-
Target
7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c
-
Size
963KB
-
MD5
484e30738734fc52fedfa1fb0432d7b4
-
SHA1
6a3232fc6cac9fbb9aebb58f683d3e66c0b3f01e
-
SHA256
7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c
-
SHA512
fa44376555b5deb286c507f4cd9c2ed2fdf9995e2f5c8b1c81f352028d2acfe9aa533bb13697ef17849b0ecba9dca991d4abf386b55c5c2a70c2634dcc2d7fb7
-
SSDEEP
12288:F2znT6YxeSg99AiewcoF0NluBVkkve7wdQZdaxzcM8A1l0X:Q7T6vSggi/FIlukGOXWcM8O0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c
Files
-
7672708e9541a791cd7e3f561ce958f09a788958e2194c8725e97985e681945c.dll windows:6 windows x86 arch:x86
38244bfc8da3c3e0a77e2179d75f3a9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
RemoveVectoredExceptionHandler
VirtualProtect
VirtualQuery
CloseHandle
CreateThread
GetModuleFileNameW
GetModuleHandleExA
GetModuleHandleExW
GetProcAddress
WaitForSingleObject
SetWaitableTimer
Sleep
CreateWaitableTimerW
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetModuleHandleA
GetModuleHandleW
GetCurrentThreadId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
AreFileApisANSI
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LocalFree
FormatMessageA
GetLocaleInfoEx
RtlCaptureStackBackTrace
GetCurrentProcessId
FreeLibrary
LoadLibraryExW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
user32
SetWindowLongW
SetWindowLongA
GetWindowLongW
AdjustWindowRect
GetClientRect
SetWindowPos
CreateWindowExW
SetProcessDPIAware
GetMonitorInfoW
MonitorFromWindow
EnumDisplaySettingsW
GetDesktopWindow
CreateWindowExA
Exports
Exports
InitializeASI
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 517KB - Virtual size: 517KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 158KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ