Static task
static1
Behavioral task
behavioral1
Sample
GenericSpoofer.exe
Resource
win10v2004-20240226-en
General
-
Target
GenericSpoofer.exe
-
Size
30.8MB
-
MD5
3f5e405fa1bd1b756ee7f467a8edc207
-
SHA1
0cc3be2da1fadbb7a7ef7d43d54fddf7055cccc0
-
SHA256
1c4899817a8541519b2cf0a44253d8af455e101ce3d1f49e0256fc6583a2b3e2
-
SHA512
f4e49220e055feaf3a52bea2e53a164e59da3ab8bc1945b425edb5f1e30bce02f358dd6136eead7c8e63dcd6f888554cd2616ba1d13804405c429e6f1d07107f
-
SSDEEP
393216:U/YIr/erzXDGecS9oof5V9nWGUYOJffoBLopY74Nd6MGLkn8wf4gLvkVEEhlRl:Wr2rzXaqooxDWG6JkLopIdkGs+Rl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GenericSpoofer.exe
Files
-
GenericSpoofer.exe.exe windows:6 windows x64 arch:x64
603cca14e066bbd89fb5ae7f7fb271f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapAlloc
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
GetWindowThreadProcessId
advapi32
CryptDestroyKey
shell32
ShellExecuteA
msvcp140
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
ntdll
RtlVirtualUnwind
normaliz
IdnToAscii
wldap32
ord211
crypt32
CertFreeCertificateChain
ws2_32
WSAGetLastError
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
strchr
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-multibyte-l1-1-0
_mbscmp
api-ms-win-crt-runtime-l1-1-0
__sys_nerr
api-ms-win-crt-stdio-l1-1-0
_read
api-ms-win-crt-heap-l1-1-0
realloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-filesystem-l1-1-0
_lock_file
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-string-l1-1-0
_strdup
api-ms-win-crt-utility-l1-1-0
qsort
Sections
.text Size: - Virtual size: 569KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3cv Size: - Virtual size: 15.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.5:] Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.:^< Size: 30.7MB - Virtual size: 30.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ