General
-
Target
BW-Spoofer7.0.exe
-
Size
5.5MB
-
MD5
32c5299957cf1a550d3e8c29e21ac35c
-
SHA1
dbc54d25e4e4cbd4ca5c0b5feba951db7e7d9d87
-
SHA256
9f19aa4e828bb60a334ca650594e0a02f85ffacb43a7ce86692cfac0ac563870
-
SHA512
2fd6c881adb5be12b922bb3a0de11ffb82498ba7f312593f2f381cdd6f3ff7be93d17e4accf5a00121da312580e3d0316c8f7e9701c60f972362cb43841b3aa1
-
SSDEEP
98304:VutcXXYES3HvNpS7c+GVSocl2eWosphgRtu3xKrJyW7z:ctIXqvf276eWSRtDHz
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BW-Spoofer7.0.exe
Files
-
BW-Spoofer7.0.exe.exe windows x64
ce3f028070532311ef9edaa7194f9117
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SleepEx
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
advapi32
SetSecurityInfo
msvcp140
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
normaliz
IdnToAscii
wldap32
ord33
crypt32
CertEnumCertificatesInStore
ws2_32
connect
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception
api-ms-win-crt-runtime-l1-1-0
strerror
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-string-l1-1-0
isupper
api-ms-win-crt-convert-l1-1-0
strtod
api-ms-win-crt-stdio-l1-1-0
fgets
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
shell32
ShellExecuteA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ