Static task
static1
Behavioral task
behavioral1
Sample
DFDWiz.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
DFDWiz.exe
Resource
win10v2004-20230703-en
General
-
Target
DFDWiz.exe
-
Size
51KB
-
MD5
daedf5e7e9522e3e415108e6f58739c0
-
SHA1
d579f7e5185f66b0d62b2c9501787b150ac1c184
-
SHA256
6b2eea8205fb9a603f49a638cfba45a0c32d71c8f26e9b10cb01050b42fd0bd8
-
SHA512
96497b8f281687e7da6b46254cc899b040ed6da4c64e9d3fa952a9876be300f0031b9bc6adae4fad71473bde1a27b646f79b29bf0bb59d998730f2050f731622
-
SSDEEP
768:H4xb57nT2FZlJ5Abtf3ifC5dVtgy1tG78AUsj6o3BlQA6UreK:GJKFA1NTg/8AUTo3BSlB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DFDWiz.exe
Files
-
DFDWiz.exe.exe windows x64
e513c960f7d5aa8d43e2a5aa898dd995
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
TraceMessage
OpenProcessToken
RegOpenKeyExW
EventWrite
RegQueryInfoKeyW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
EventRegister
EventUnregister
RegEnumValueW
kernel32
GetCurrentThreadId
HeapAlloc
GetCurrentProcess
CreateFileW
HeapFree
OpenMutexW
GetProcAddress
LocalFree
GetVersionExW
FormatMessageW
GetProcessHeap
HeapSetInformation
RegisterApplicationRestart
Sleep
CloseHandle
OutputDebugStringA
QueryActCtxW
GetModuleHandleExW
GetModuleFileNameW
CreateActCtxW
FindActCtxSectionStringW
LoadLibraryW
ActivateActCtx
GetLastError
DeactivateActCtx
CreateMutexW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
SetLastError
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
DeviceIoControl
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
user32
MessageBoxW
msvcrt
memcmp
__C_specific_handler
memcpy
_vsnwprintf
malloc
_callnewh
free
_XcptFilter
_amsg_exit
_ismbblead
?terminate@@YAXXZ
_commode
_fmode
_acmdln
_initterm
__setusermatherr
memset
_cexit
_exit
exit
__set_app_type
__getmainargs
__CxxFrameHandler3
_wcsicmp
ole32
CoInitializeEx
CoCreateGuid
CoCreateInstance
CoUninitialize
StringFromGUID2
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WinSqmSetDWORD
WinSqmAddToStream
WinSqmStartSession
WinSqmEndSession
setupapi
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInterfaceDetailW
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ