Static task
static1
Behavioral task
behavioral1
Sample
Monoxidex64.exe
Resource
win10v2004-20230220-en
General
-
Target
Monoxidex64.exe
-
Size
319KB
-
MD5
6f2fe7af5623a400bfe4bb8219e2f1d1
-
SHA1
3a8b19a0777d144130fe9c40cd7755f8eb2d8b68
-
SHA256
abb24aa3fdc111a14e07ac5bef1585b16bbdee5ea5fc17693d245b30052bb28d
-
SHA512
2a4c74eca2746ce5792fef54f34bb2ff39b4b262e8eff661b85dabe8195ba43a40d5776603ba97155e3b977bfc6a89a31a437e9177f742412a7496d56b774f85
-
SSDEEP
6144:Q0sXeFKzljcWq+HOcRlL80lOi9E3AAqgm:Q0sOFKz2l+L80lOi9E3AAqz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Monoxidex64.exe
Files
-
Monoxidex64.exe.exe windows x64
eef6e185d6ca104e533458db6fc53aa6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutOpen
waveOutPrepareHeader
kernel32
GetLastError
lstrcatW
DeleteFileW
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
LocalFree
CreateProcessW
CopyFileW
lstrcpyW
lstrcmpW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
CreateMutexW
WaitForSingleObject
TerminateThread
FreeLibrary
HeapFree
HeapReAlloc
HeapSize
GetStringTypeW
Sleep
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetLogicalDriveStringsW
SetFileAttributesW
CreateFileW
FindClose
GetTempPathW
GetModuleFileNameW
RemoveDirectoryW
WriteFile
GetCurrentProcess
FindFirstFileW
FindNextFileW
ReadFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
GetFileType
GetACP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
user32
GetMessageW
DispatchMessageW
SetTimer
TranslateMessage
EnumDisplayMonitors
GetWindowRect
GetDC
EnumChildWindows
CallNextHookEx
GetSystemMetrics
SetWindowTextW
DrawIcon
DestroyCursor
ShowWindow
GetCursorInfo
RedrawWindow
MoveWindow
UnhookWindowsHookEx
EnumWindows
mouse_event
SetWindowsHookExW
SetCursorPos
ReleaseDC
EnableWindow
MessageBoxW
ExitWindowsEx
gdi32
DeleteDC
CreatePen
Ellipse
DeleteObject
CreateSolidBrush
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
FreeSid
SetNamedSecurityInfoW
shell32
ShellExecuteW
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ