Static task
static1
Behavioral task
behavioral1
Sample
offset.exe
Resource
win11-20240802-en
General
-
Target
offset.exe
-
Size
1.9MB
-
MD5
d67168f943e3c3361290d59d97510828
-
SHA1
c73a74f91d7e7f0921634f08c239933f7a7b589c
-
SHA256
f0f5321fa169d31ce7a2d55b537b598d6ae6e8a9390acfdcea955b0c13a7b732
-
SHA512
6a0f0a2c46eb0f815c31368df8b33fce09e303caf9dff87ed14a118720af21d5558ce7562587bc01e002020a3b45811c4933d5d2e356fc655ee565b5106c9509
-
SSDEEP
24576:dnUKv+m/uMlr5h4zXsozrkLzomhZB8PiNHky7xMvTwjOosH:doIuMxXEpyomhZB8PiNHky7xSTv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource offset.exe
Files
-
offset.exe.exe windows:6 windows x64 arch:x64
3d196a18b6ecf288bcb643eda9b6bc5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThreadId
MultiByteToWideChar
WriteConsoleW
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetCurrentDirectoryW
GetEnvironmentVariableW
CreateFileW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
InitializeSListHead
GetFullPathNameW
CreateDirectoryW
WriteProcessMemory
ExitProcess
GetSystemTimeAsFileTime
GetProcessHeap
HeapAlloc
RtlCaptureContext
RtlLookupFunctionEntry
GetCurrentProcessId
CreateMutexA
WaitForSingleObjectEx
LoadLibraryA
ReleaseMutex
RtlVirtualUnwind
AcquireSRWLockShared
ReleaseSRWLockShared
GetFinalPathNameByHandleW
GetFileType
ReadProcessMemory
WaitForSingleObject
GetCurrentProcess
Sleep
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
K32GetModuleInformation
K32GetModuleFileNameExA
IsDebuggerPresent
UnhandledExceptionFilter
K32EnumProcessModulesEx
VirtualQueryEx
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryExW
SetThreadErrorMode
TryAcquireSRWLockExclusive
FindFirstFileW
FindClose
FindNextFileW
lstrlenW
SetUnhandledExceptionFilter
GetModuleFileNameW
SetLastError
GetCommandLineW
GetCurrentThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
SetConsoleMode
GetConsoleMode
GetStdHandle
GetModuleHandleA
HeapReAlloc
GetLastError
QueryPerformanceCounter
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
HeapFree
IsProcessorFeaturePresent
bcrypt
BCryptGenRandom
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
ntdll
RtlNtStatusToDosError
NtReadFile
NtWriteFile
NtQueryInformationProcess
oleaut32
GetErrorInfo
advapi32
SystemFunction036
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
vcruntime140
memcmp
__current_exception
__C_specific_handler
_CxxThrowException
memset
memcpy
memmove
__CxxFrameHandler3
__current_exception_context
api-ms-win-crt-string-l1-1-0
strlen
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_set_app_type
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
terminate
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 430KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ