Static task
static1
Behavioral task
behavioral1
Sample
NDProxy.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NDProxy.exe
Resource
win10v2004-20230703-en
General
-
Target
NDProxy.exe
-
Size
48KB
-
MD5
711c820399d270e8f2aaec2b5e2cf49c
-
SHA1
56b01f142213eccad5c5fb190f6b481b9c65bca1
-
SHA256
2962811b8f67fdc617adfb167d52c7a9572eb2ecbac6c28b0aedf4c034bd7be1
-
SHA512
cfac4d2d6a75a0527e9ba53075a764fbc19bda733ae7033f9a870531571ad6ec8551f62cbf013bb42145b44d5da2b6c74e12fec4edbeb2dfd7023e690d58d373
-
SSDEEP
768:R5eIhV7UuAbH0cNoTXgCthCh6ZmCRmSQ5J46ep0o7:R5eyAz0NLghifA5G0o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NDProxy.exe
Files
-
NDProxy.exe.exe windows x86
fd976b31642c025cbdf23666d9098db8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DeviceIoControl
VirtualAlloc
CreateFileA
GetLastError
GetCurrentProcessId
GetProcAddress
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetFileAttributesA
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
HeapAlloc
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
LoadLibraryA
MultiByteToWideChar
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE