Static task
static1
Behavioral task
behavioral1
Sample
GenericSpoofer.exe
Resource
win10v2004-20240709-en
General
-
Target
GenericSpoofer.exe
-
Size
23.8MB
-
MD5
d7b1b6fd78fc9efea50bdbbed4faddab
-
SHA1
11feeb8953c0aced975fef48d98289cc838608de
-
SHA256
66dc4d243e776ea3b86bda8783537db4a1eeb6c291d23cdbd7828891f9a45007
-
SHA512
0583bc0125109762dc06ce93cd2444ffd31363cc95fe06773ba1030fe5228ede823b88fdf451d67faa9a70ae57d4e2655292f7a5361d6fb4bc6f75c7bd2c5ddf
-
SSDEEP
393216:YbaVrZDXv/zpuNzUaeRI3S3We0XajZN1i87Akdnt9YMDKvyPGo:Yba1tFuN4aeRI3SUXaFNvt9YMDrl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GenericSpoofer.exe
Files
-
GenericSpoofer.exe.exe windows:6 windows x64 arch:x64
1a5d10a0a5c4f9ec5c641d2bf9c90fae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
AcquireSRWLockShared
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
EnumWindows
advapi32
SetSecurityInfo
shell32
ShellExecuteA
msvcp140
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
ntdll
RtlLookupFunctionEntry
normaliz
IdnToAscii
wldap32
ord45
crypt32
CertFreeCertificateChain
ws2_32
accept
rpcrt4
UuidCreate
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-convert-l1-1-0
strtod
api-ms-win-crt-multibyte-l1-1-0
_mbscmp
api-ms-win-crt-runtime-l1-1-0
strerror_s
api-ms-win-crt-stdio-l1-1-0
_lseeki64
api-ms-win-crt-heap-l1-1-0
realloc
api-ms-win-crt-math-l1-1-0
_dclass
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-filesystem-l1-1-0
_stat64i32
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
_dupenv_s
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
strcpy_s
Sections
.text Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 876KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$T3 Size: - Virtual size: 10.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.`#k Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.3T) Size: 23.6MB - Virtual size: 23.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ