Static task
static1
Behavioral task
behavioral1
Sample
MCEAuthBypass-x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MCEAuthBypass-x64.exe
Resource
win10v2004-20240802-en
General
-
Target
MCEAuthBypass-x64.exe
-
Size
312KB
-
MD5
8d63e919c2603d335ebba8f6673f664c
-
SHA1
35873677c5b43c0ae197ef1daf1e5d73df9d06c8
-
SHA256
dfd3b7c9ee9b9f96b2f2f13941ce0a5e05dab82e92d20c66c654be8c07f9ccee
-
SHA512
ce38e7329a5ffdcf43ac137489ea637a755b8a81d8cb510eca020767c87857c6aa57bed7a5ee6d0a6124d0a7ebf8adbaf168966dc2f8c10a239feb1e82ad1165
-
SSDEEP
6144:2uHI+wfgMKKVz0y33XSAvh5Qs/hUEO+u8VEqnwrtXwENNhMNZNNNMNNNfhNNQN+m:NsfgMKqvXZ55Qn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource MCEAuthBypass-x64.exe
Files
-
MCEAuthBypass-x64.exe.exe windows:6 windows x64 arch:x64
99f79fe228fd7b503ae7ca1e427c2ac4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_access
_acmdln
_aligned_free
_aligned_malloc
_amsg_exit
_assert
_beginthreadex
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fclose
fflush
fopen_s
fprintf
fputc
fread
free
fseek
ftell
fwrite
getenv
isxdigit
localeconv
malloc
mbstowcs
memchr
memcpy
memmove
memset
printf_s
realloc
signal
strcmp
strerror
strlen
strncmp
strncpy_s
strtok_s
strtol
vfprintf
wcscmp
wcslen
user32
MessageBoxA
kernel32
AcquireSRWLockExclusive
CloseHandle
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
FlsAlloc
FlsGetValue
FlsSetValue
GetCurrentThreadId
GetLastError
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadId
InitOnceExecuteOnce
InitializeCriticalSection
IsDBCSLeadByteEx
K32EnumProcessModules
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadProcessMemory
ReleaseSRWLockExclusive
RtlLookupFunctionEntry
RtlRestoreContext
RtlUnwindEx
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
SleepConditionVariableSRW
SwitchToThread
TlsGetValue
TryAcquireSRWLockExclusive
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteProcessMemory
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ