Static task
static1
Behavioral task
behavioral1
Sample
GGzera_Spoofer.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
GGzera_Spoofer.exe
Resource
win10v2004-20230703-en
General
-
Target
GGzera_Spoofer.exe
-
Size
3.7MB
-
MD5
cd91b01587e8e365074fd854ef6712b0
-
SHA1
65adfd5ec5ad87f08b97c3592956741447dfa8f4
-
SHA256
9bf04e9be21f8368d1d055635ca1d598ddbd23adbadc56678705c86de222e58e
-
SHA512
8c23751573402ec94444601bcf303fa030aec300ba68254657bce294a185925883c6505feca4d3e5bbd9142e89c12ceabcd45be1d9fb7795c60ac351116be794
-
SSDEEP
98304:TFE20xIHkeXTKvoXPc59B9BJ+Ib0cy5kdd1WGuVk7Fl:xwx4KvoXPensfgWGum
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GGzera_Spoofer.exe
Files
-
GGzera_Spoofer.exe.exe windows x86
2cb97a5feb8ea2bbe0dd8541916f35de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
user32
MessageBoxA
advapi32
RegisterEventSourceW
comctl32
InitCommonControls
mscoree
_CorExeMain
shell32
PathMakeUniqueName
Sections
Size: - Virtual size: 3.5MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 94KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE