D:\Sources\foobar2000-2.24\foobar2000\Release\foobar2000.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3.exe
Resource
win10v2004-20241007-en
General
-
Target
f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3.exe
-
Size
8.4MB
-
MD5
7119698425e2056d404e97b12ed5ca37
-
SHA1
47ebc0744e88fbe12876471b49f4df80195f428a
-
SHA256
f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3
-
SHA512
817eb34af541cd6b7b0a67e8d09668014c3fe9e43cb4df355840a2f7529853a8e34ca6d9af3e9b35137c7e13a6de98874dff50b962dc1d10b4e2a3041a9efede
-
SSDEEP
98304:Gnbgpe4NdaEMybVR/XfJca1tzZdBTXuOMehkf9O:WUpe4qiJdxcg/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3.exe
Files
-
f3646ac33546540137231400c43e90525e2bc6fad1ba2c27cb56466c65bd58b3.exe.exe windows:6 windows x86 arch:x86
d0efa8288bc8fcf1ae384debe93de6ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Destroy
ord410
ImageList_Create
ImageList_Add
ord17
ord412
ord413
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
shlwapi
ord12
SHAutoComplete
StrCmpLogicalW
SHDeleteKeyW
uxtheme
IsThemePartDefined
OpenThemeData
GetThemePartSize
SetWindowTheme
DrawThemeBackground
EnableThemeDialogTexture
CloseThemeData
kernel32
GetSystemPowerStatus
VerifyVersionInfoW
VerSetConditionMask
GlobalFree
SystemTimeToFileTime
LocalFileTimeToFileTime
ResumeThread
GetLocaleInfoW
GetNumberFormatW
GlobalSize
DecodePointer
Sleep
SetErrorMode
LoadLibraryW
CreateEventW
FindResourceW
FindResourceExW
LoadResource
LockResource
SizeofResource
SetEndOfFile
GetFileTime
FlushFileBuffers
CreateFileW
GetDiskFreeSpaceExW
FindFirstFileW
DeleteFileW
RemoveDirectoryW
GetFileAttributesW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
GetCurrentThreadId
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SystemTimeToTzSpecificLocalTime
MoveFileExW
NormalizeString
TryEnterCriticalSection
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
DeviceIoControl
SetFileTime
SetFilePointer
DosDateTimeToFileTime
GetFileSizeEx
FileTimeToSystemTime
GetSystemTimeAsFileTime
ReadDirectoryChangesW
GetThreadPriority
GetThreadId
GetFileInformationByHandle
TerminateProcess
GetCurrentProcess
DuplicateHandle
WriteFile
CancelIo
GetOverlappedResult
ReadFile
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
FormatMessageW
GlobalUnlock
GlobalLock
GlobalAlloc
GetCommandLineW
LoadLibraryExW
lstrlenW
GetNativeSystemInfo
GetVersionExW
PowerCreateRequest
PowerClearRequest
PowerSetRequest
SetLastError
EnterCriticalSection
SetThreadPriority
OutputDebugStringW
LeaveCriticalSection
GetTickCount64
DeleteCriticalSection
GetFileAttributesExW
FindNextFileW
FindClose
GetCurrentThread
SetEvent
ResetEvent
GetExitCodeThread
GetCurrentProcessId
VirtualQuery
VirtualProtect
GetSystemInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockShared
CopyFileW
IsDebuggerPresent
FreeLibrary
SetDllDirectoryW
CloseHandle
WaitForSingleObject
GetModuleHandleW
GetProcAddress
GetTickCount
GetProcessHeap
HeapAlloc
CreateMutexW
InitializeCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
MulDiv
InitializeCriticalSectionEx
GetLastError
RaiseException
VirtualFree
user32
SetDlgItemTextW
MapVirtualKeyW
GetDlgItem
SendMessageW
ShowWindow
EnableWindow
SetWindowTextW
DestroyWindow
UnregisterClassW
CreateDialogParamW
SetWindowLongW
SendDlgItemMessageW
GetActiveWindow
GetWindowLongW
GetClientRect
ClientToScreen
GetWindowRect
SetWindowPos
SetLayeredWindowAttributes
CharUpperW
GetComboBoxInfo
GetSystemMetrics
EnumThreadWindows
GetWindowPlacement
IsIconic
AdjustWindowRect
DrawEdge
SetClipboardData
CloseClipboard
OpenClipboard
FillRect
AdjustWindowRectEx
GetWindowTextLengthW
GetWindowTextW
NotifyWinEvent
RedrawWindow
IsRectEmpty
DrawTextW
TrackMouseEvent
InflateRect
FrameRect
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
GetNextDlgTabItem
InvalidateRgn
SystemParametersInfoW
ScrollWindowEx
SetScrollPos
UpdateWindow
SetScrollInfo
SetRectEmpty
SetGestureConfig
CloseGestureInfoHandle
GetGestureInfo
GetScrollInfo
MapDialogRect
IsZoomed
SetMenuItemInfoW
GetMenuItemInfoW
GetMenu
GetWindow
GetDC
BeginPaint
EndPaint
InvalidateRect
IsWindowEnabled
PostMessageW
CreateWindowExW
ScreenToClient
IntersectRect
MonitorFromWindow
LoadIconW
RegisterClipboardFormatW
wsprintfW
AllowSetForegroundWindow
EnumWindows
GetClassNameW
GetWindowThreadProcessId
WindowFromPoint
CheckMenuRadioItem
RegisterShellHookWindow
DeregisterShellHookWindow
RegisterWindowMessageW
RegisterClassW
GetClipboardData
IsCharAlphaW
IsClipboardFormatAvailable
DispatchMessageW
TranslateMessage
LoadImageW
GetDesktopWindow
PostQuitMessage
GetMessageW
MsgWaitForMultipleObjects
OffsetRect
CopyRect
MonitorFromRect
CharLowerW
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
EmptyClipboard
IsWindowVisible
MoveWindow
IsChild
PeekMessageW
SetTimer
DrawTextExW
SetForegroundWindow
PtInRect
DefWindowProcW
GetCursorPos
SetFocus
KillTimer
SetCapture
SetCursor
LoadCursorW
IsDialogMessageW
RegisterClassExW
GetClassInfoExW
CallWindowProcW
GetWindowDC
ReleaseDC
DrawFrameControl
GetParent
GetKeyState
GetMessagePos
AppendMenuW
TrackPopupMenu
CreatePopupMenu
MonitorFromPoint
GetMonitorInfoW
DestroyMenu
MessageBoxW
EndDialog
DialogBoxParamW
MessageBeep
SetActiveWindow
EnumChildWindows
MapWindowPoints
SetMenuDefaultItem
TrackPopupMenuEx
GetDlgCtrlID
GetSysColor
GetFocus
TranslateAcceleratorW
LoadAcceleratorsW
DestroyAcceleratorTable
RegisterHotKey
UnregisterHotKey
gdi32
GetStockObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
ExtTextOutW
SetBkColor
SetTextColor
DeleteDC
DeleteObject
GetObjectW
CreateFontIndirectW
SetBkMode
CreateRectRgnIndirect
CreateRectRgn
GetTextExtentPoint32W
GetTextColor
GetBkColor
GetCurrentObject
SetDCBrushColor
CreatePen
GetDeviceCaps
GetTextMetricsW
LPtoDP
SaveDC
RestoreDC
OffsetWindowOrgEx
SetWindowOrgEx
IntersectClipRect
CreatePolygonRgn
FrameRgn
FillRgn
SetViewportOrgEx
BitBlt
CombineRgn
SetDCPenColor
LineTo
MoveToEx
OffsetRgn
advapi32
CryptImportKey
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegOpenKeyW
RegCreateKeyW
RegDeleteValueW
CryptGetHashParam
CryptVerifySignatureW
CryptHashData
CryptCreateHash
RegGetValueW
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
RegEnumValueW
CryptAcquireContextW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
shell32
SHOpenFolderAndSelectItems
SHGetFolderPathW
ord74
SHCreateItemFromIDList
DragAcceptFiles
ShellExecuteExW
ord680
SHGetDesktopFolder
DragFinish
ole32
CoCreateInstance
OleSetClipboard
OleGetClipboard
CoTaskMemFree
PropVariantClear
CLSIDFromString
CoTaskMemAlloc
ReleaseStgMedium
CoCreateGuid
DoDragDrop
CoUninitialize
RegisterDragDrop
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
RevokeDragDrop
oleaut32
VariantClear
VariantInit
SysAllocString
oleacc
AccessibleObjectFromWindow
LresultFromObject
crypt32
CertVerifyRevocation
CertVerifyCertificateChainPolicy
CertGetCertificateChain
CertVerifyTimeValidity
CertCloseStore
CertFreeCertificateChain
CertFreeCertificateContext
Sections
.text Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 477KB - Virtual size: 480KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ