Static task
static1
Behavioral task
behavioral1
Sample
SuperF4.exe
Resource
win10v2004-20220812-en
General
-
Target
SuperF4.exe
-
Size
39KB
-
MD5
00549b9467a142cb8f46d12353c1fc9e
-
SHA1
dbe73a6f07cdb1cc48e55eca5fe6b9f12a5eeb30
-
SHA256
3c83c8dfe3fb718c175c7444837c938a32af6a24572a9a3405fae217fa771941
-
SHA512
a396c49d4c6b520bdd7a8e8d2410e4d95d2b011d7015642235d3a2a3bb5d98966e02d1174c94442957b231c389055abbe6ae08df565ed9b0d069606758896bc0
-
SSDEEP
768:NqggLH5oiKv3Rf6iyJ653LX1hsvA27bpWM:QggLH430iOE3Lts
Malware Config
Signatures
Files
-
SuperF4.exe.exe windows x64
1588c22c698dbc10fc81f954bea12948
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetTokenInformation
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetPrivateProfileStringW
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
OpenProcess
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WritePrivateProfileStringW
msvcrt
__C_specific_handler
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_lock
_onexit
_unlock
_wtoi
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
realloc
signal
strchr
strlen
strncmp
vfprintf
wcscat
wcscpy
wcslen
wcsncpy
wcsstr
_vsnwprintf
_wcsicmp
psapi
GetProcessImageFileNameW
shell32
ShellExecuteW
Shell_NotifyIconW
shlwapi
PathRemoveFileSpecW
PathStripPathW
user32
CallNextHookEx
CloseClipboard
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyMenu
DestroyWindow
DispatchMessageW
EmptyClipboard
GetAncestor
GetAsyncKeyState
GetCursorPos
GetForegroundWindow
GetMessageW
GetSystemMetrics
GetWindowThreadProcessId
InsertMenuW
KillTimer
LoadImageW
MessageBoxW
MoveWindow
OpenClipboard
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
SendMessageW
SetClipboardData
SetDlgItemTextW
SetForegroundWindow
SetLayeredWindowAttributes
SetTimer
SetWindowsHookExW
ShowWindow
ShowWindowAsync
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
WindowFromPoint
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE