C:\Users\tickr\Downloads\SecHex-Spoofy-main (4)\SecHex-Spoofy-main\SecHex-GUI\SecHex-GUI\obj\Debug\net6.0-windows\SecHex-GUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.exe
Resource
win10v2004-20240802-en
General
-
Target
Secure Spoofer 1.6.0.zip
-
Size
3.6MB
-
MD5
bc1f9ba7fc6568a0bff61b9982d2027d
-
SHA1
ecbb2e6f0ce6af47182187a1f03c6ca60f53a6a4
-
SHA256
7449ba996dedfaf2bb978a206173902a452ca59fa029084600334bafe90bcf9b
-
SHA512
9dad7d2f24efa44343af893cec235c2872645460ebebda5bcb5c9163457963bc740bdcf4224e567908b8549ae5fcd058485dd74cc3dac98fc85f08515a8e727b
-
SSDEEP
98304:9BxAr05hnONcQcZFAxEDgzr+Djsjq9hvr2cL2meW52U0fRd+zee:ZArChnO2Q+yr+DojSEc/A4ie
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.dll
Files
-
Secure Spoofer 1.6.0.zip.zip
Password: spoofy
-
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.deps.json
-
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.dll.exe windows:4 windows x86 arch:x86
Password: spoofy
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.exe.exe windows:4 windows x86 arch:x86
Password: spoofy
Code Sign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:44:18:e2:de:de:36:dd:29:74:c3:44:3a:fb:5c:e5Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before02/07/2021, 00:00Not After10/07/2024, 23:59SubjectCN=Google LLC,O=Google LLC,L=Mountain View,ST=California,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
01Certificate
IssuerCN=Dummy issuerNot Before01/01/2013, 10:00Not After01/04/2013, 10:00SubjectCN=Dummy certificate05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
89:26:a6:fe:99:b6:ab:09:b9:cb:d3:38:6e:8f:6b:19:76:c7:79:16:77:8a:91:b0:b6:43:33:9a:45:19:d7:efSigner
Actual PE Digest89:26:a6:fe:99:b6:ab:09:b9:cb:d3:38:6e:8f:6b:19:76:c7:79:16:77:8a:91:b0:b6:43:33:9a:45:19:d7:efDigest Algorithmsha256PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Exports
Exports
��iʧs�k�l���V lᦰ�qf�p@�0�C����v�HP�0�U���O�O��oj��P�s�����ɀ'd�?� �U��R�P���������Qz�?�x%sQF��e���۹&�`�&����.�Ȝ�,p�)��[=�wҒk�� ��ƌ~H�� �ZġA��X�8F� M(����g�����J"��2I����G��b7�Spx7Q'�69��T�9mo��~���,���j�xnn�m�����<6��(se�S��E�(���%�7�S�֣Ό�����ѻ����p���̓�U�����`��^� r�he�M3�0�8R��q9Lv�>�yD��J�b=�^�Q�:�Am.Q��3����X&s��/�u(f��0�>`yPQ&��w�U�{��\�asT�@,'��ꓶf��p�8�����s�b� ��&$���l�6�ߑ���z�"{s�@���P/��A&x=�U��a(��\r����I��nE�kK�8J��}�&�":��^5��(#�z[d�&��e�}�%x�En3�d9��U�P@O�����e�*U����'y\w�e��*�:�v� s4���K���My`�7SR �aq�.�r���L�T�����F6bKl�R�hΓ�;�����\�W�0��ň�+:��殖�zv�:�����%l�3em/ ���N��<Q,��J�rx��u��_ؓ\��{;��C��B��o`��hҞ�˧�j��k8ف!�2�ژ�1�Rb�n�㆙���^X��?���RT[�N�O�0�`��|rW��/����r�7�k�(�А]�` ^1�[F~�Ҏ����})�%��E��i|e̞����lc��N�z:Q��\����!�W��m}��7��&q-��2�妍��ۏ~$(o/R�Vm[��:���Q(ߋtW��Zw j���\�i��>�2�+���+L�<J��M���M��*r�l�:ԈH u���K�/u�V{�Ml�V���8�یƖtfU�����^|3�$|BUa��3n����qQc:4{OP�����6=+�8��b�CX���҇sPR�?.�+ڏ�L�&7Y�����b���hT<�~�{��;</#.�st��P� �GH�u89OΑ�w.��'�Q��t���1OY�,�����oRD�b�����,J{�������,Y$���"j]��mC�;��&�����Y ������p͍�c���|ΜiWFM#��� j�U��E�J�RmN1m��Q��/D������ ��mg�����n��p��X��闷�X� \9V�6�f�Kh��b����.>L� ڍ1��r6~Y�u!,v�� �ܪz�&�,�s�i띙6}Npg���T�IV��q��M$�1��\�G���k(G4l�� \��1�Dc�!O���IH��k uP��Z�֕c� ���6�J�3�c\{���)�|�s�>`���T��,�'����4�����.���&�(�ډ���r�� H"����fM � ������b:�����&%f�Z� �#�vLF�m�I��8�6BI#�_�w����s���g�q�}�^Xȥ�.ЙҠ�Hςb�����*��/�y���nX�R���zP�>�Γ���*A�!���RO5<�׳e��s��?�����*۷ W:�4����0!e�.��u�Щt ��i��B!��0p���+eK��fG2tO�w^ח�j �Jދ������{�+��� �V�V�9Oof�Z����� �������ޠ��h�I\f)2!��[��������B���f���0I����,��^�s#�N� qu�Ѧ�x�P��k��&�b�5J%��1�v�hy:TMS�l���i��m���PZ����u^^��u�J�Yݐ�0�y�dȭ�r���@"�I�@lyIg(��9��z�E���齺���yP�כt+٤�EͽװJ���n��5�q��}Ld0p{���`�#"�xx6����!J����7���J����d!g��lߺ+u����^B�h�=d�gc�(��������� S��|꽃IL���Lt � �&R{�I��������D�r����pܙ�i�]�>���p��(l����u���[����䃼=d�6�O%,�I��Kg|V�h��+ g5��]���Un ����:�v��{����'�=� ه��)����#I�O���?���7=�S�}�y�1H�Ȱ(�HC�te����a'&������{��R�]�������� Q4��@�tҊxģ�Xqiԛ��u`�X�B��x�PŝP�+(;�&����Juix�G�B:�=HB|��N�l��<���Tmpe3�� �*�@ Ye[���,����^�9] #/b*��}5L�҃S��!���1�O�����l� ŰT���@�:S�����^�������&(&8����er�V��YU��Ce�L.�ΰ���w/s��<��܄�7�t,Ŕ�$NB �琾��{ijEh����9��S�b�a��2!4C)_�-��� k=��྾7 ��ݛ'��R�#�H퇌m������+�����Kv��=R���ջa;�78���7C?qil�vٙ��/��*S;���lxE��ݕX19tr�2x�jH��ѶA�-�������� j���Y]~f�R��Sc���ݪ�'�2/s�DO�5j��&]��G^%����!�"�k����U�P���U�Za`�����ͺ?[�/�j�f��p'ώ���4_ЎП���bx#/��FQ����L�2H�"k��u[��Xru{x�]SzG�Cv�-W2�����D� ��ߦ�C��y��ݫ���<�>���T���O&�l/> _d��%i7I���F/<�Yc���F���$I1�=x�(9��_~~�܆�(�oXe�W������kּ��I����cى4��%���:Y�.�/а`��ª|7/��C�X��Q�T�Z��gP��qz����j��2�gJq�r�o �8%�-FN�nD.�WB�qv�����\1��S|��X>��8�k����10D�t����!\0��Z����\��S�ñ����7�X7L\%��'ts�4d���������O�֨�L87�[Y�_h��أ;���@��DF;�WO�b����Dū���7L�R��� yM� WZ�~��1l��:����uca�4������i�b17��0P ;�8kX�D��c��6��?y��my{���Ҕ&D^H��\t�$�0)�(5Y�k!�LV�����4�>)��я� �hϋL�H�r�o��a�U�~�zѰ@o��d\��"�H��m� ww��Ę�`�d7�a�C?��g��1��%u���&�=�#p� �{�Rx�+�ꥳkC,�S ����6Y��i<zn���W������[��O�^/�R�U���{���Y���0��f�����QWS����`w�t����<NZw����� v�zj�@��@���<e����ՠ;ADp�"�e�����u�t���C�M?wc��B�D-�.B��ϰho~�];^?�7kd���ǻ�SQ�qE����,�4��Ӟ��k
Sections
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.pdb
-
V1.6.0/SecHex-Spoofy V1.6.0/SecHex-GUI.runtimeconfig.json