Static task
static1
Behavioral task
behavioral1
Sample
DFDWiz.exe
Resource
win10v2004-20231020-en
General
-
Target
DFDWiz.exe
-
Size
50KB
-
MD5
72ecfd20db8ae2c475856699987cade3
-
SHA1
513c71900c4f04a2c681d2ed2ed169c3f0d0a3d3
-
SHA256
60cd7954bbe02422f9c28fc95b234426615d3f5dbaf7f7d2b733ada657c6d406
-
SHA512
08f818fedf4f2f96fb972869a21ce6e5e2735ea8672fca3b95d52e14fe1e3e9f8a73fb9295dd718073773b76b430019f56522b38fdb60aae6adf20d33880b14f
-
SSDEEP
768:gnm5UETuFLczkNQ9GHQx4oj0GZND7k1Uk9wFO6Omc0G0zmjuHShGF:XS9g9nZDjO6DS0SLhG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DFDWiz.exe
Files
-
DFDWiz.exe.exe windows:10 windows x64
9c226fe10129110fca3fb352dcfdb2ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
TraceMessage
OpenProcessToken
RegOpenKeyExW
EventWrite
RegQueryInfoKeyW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
EventRegister
EventUnregister
RegEnumValueW
kernel32
GetCurrentThreadId
HeapAlloc
GetCurrentProcess
CreateFileW
HeapFree
OpenMutexW
CreateMutexW
GetProcAddress
GetVersionExW
FormatMessageW
GetProcessHeap
HeapSetInformation
RegisterApplicationRestart
CloseHandle
OutputDebugStringA
QueryActCtxW
GetModuleHandleExW
SetLastError
GetModuleFileNameW
CreateActCtxW
FindActCtxSectionStringW
LoadLibraryW
ActivateActCtx
GetLastError
LocalFree
Sleep
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
DeactivateActCtx
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
DeviceIoControl
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
user32
MessageBoxW
msvcrt
memcmp
__CxxFrameHandler3
memcpy
malloc
_callnewh
free
_XcptFilter
_amsg_exit
_vsnwprintf
__setusermatherr
?terminate@@YAXXZ
_commode
_fmode
_acmdln
__C_specific_handler
_initterm
memset
_ismbblead
_cexit
_exit
exit
_wcsicmp
__set_app_type
__getmainargs
ole32
CoCreateGuid
CoInitializeEx
CoCreateInstance
CoUninitialize
StringFromGUID2
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WinSqmStartSession
WinSqmEndSession
WinSqmSetDWORD
WinSqmAddToStream
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ