Static task
static1
Behavioral task
behavioral1
Sample
Monoxidex86.exe
Resource
win10v2004-20240412-en
General
-
Target
Monoxidex86.exe
-
Size
285KB
-
MD5
2d86c59f442d667212cf3b69967fe891
-
SHA1
0d686590ad41c4fff6323c1712f95eb58b628f99
-
SHA256
6fb7cefd67ceb6573e47e0401f90496fe6c7555c7969120158d65deb1ee75a62
-
SHA512
955a38631738ac0c01784878e9b62ae589a8651a632c9da425ef6c08ad3e19abe3ae1f2e175a57774a6cb04162dc0eda6889cf8ed9c7040f0c15dc0b0692a0a5
-
SSDEEP
3072:8ggtCunocB7XmfOZBGpjka+q10UGuBNFndQ8333AlOi9E3AAqgm2Jy6t:TcB7X6OnGpjkyD3nOHlOi9E3AAqgmM5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Monoxidex86.exe
Files
-
Monoxidex86.exe.exe windows:5 windows x86 arch:x86
cbc244689399c998b32df193312b1567
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutOpen
waveOutPrepareHeader
kernel32
GetLastError
lstrcatW
DeleteFileW
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
LocalFree
CreateProcessW
FreeLibrary
CopyFileW
lstrcpyW
lstrcmpW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
DeleteVolumeMountPointA
CreateMutexW
WaitForSingleObject
TerminateThread
HeapFree
HeapReAlloc
HeapSize
GetStringTypeW
Sleep
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetLogicalDriveStringsW
SetFileAttributesW
CreateFileW
FindClose
GetTempPathW
GetModuleFileNameW
RemoveDirectoryW
WriteFile
GetCurrentProcess
FindNextFileW
WriteConsoleW
FindFirstFileW
ReadFile
DecodePointer
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetFileType
GetACP
GetModuleHandleExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
user32
GetMessageW
DispatchMessageW
SetTimer
TranslateMessage
EnumDisplayMonitors
GetWindowRect
GetDC
keybd_event
EnumChildWindows
CallNextHookEx
GetSystemMetrics
SetWindowTextW
DrawIcon
DestroyCursor
ShowWindow
GetCursorInfo
RedrawWindow
MoveWindow
UnhookWindowsHookEx
EnumWindows
mouse_event
SetWindowsHookExW
SetCursorPos
ReleaseDC
EnableWindow
MessageBoxW
ExitWindowsEx
gdi32
DeleteDC
CreatePen
Ellipse
DeleteObject
CreateSolidBrush
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
shell32
ShellExecuteW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ