Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
spoofer.exe
-
Size
35.4MB
-
MD5
e51b01e34475df6eaa496d342c02d1a9
-
SHA1
c0f15a80b233bb7525a6deb033b0799fd17748cf
-
SHA256
16265ce946eace44240b9a54e29660e592c30888d1bd9459897d85c6fae8dc79
-
SHA512
eb0c27bda495301776997e4f86935842736d35fb311fa32cf0020232b07affe8c0003cc7f6ce343ba472e5e852249ce1a502a265b3a61cb8d4393604745ff5fe
-
SSDEEP
393216:on/dELNprfJEo2XmIQbttq/mg7h9O4C79s3c4RSZCzyifOKxnNRF6NK4z0ZAf3pY:DpDD2We/r3zRkC9WKT6Ndz4AfA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spoofer.exe
Files
-
spoofer.exe.exe windows:6 windows x64 arch:x64
80741c3b7ab03677f6a13f2498db5477
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_43
D3DCompile
kernel32
QueryFullProcessImageNameW
user32
ClientToScreen
advapi32
CryptGetHashParam
shell32
ShellExecuteW
ole32
CoInitializeEx
oleaut32
SysFreeString
secureenginesdk64
ord28
winmm
PlaySoundA
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
imm32
ImmReleaseContext
dwmapi
DwmExtendFrameIntoClientArea
shlwapi
PathFindFileNameW
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
winhttp
WinHttpConnect
ntdll
RtlLookupFunctionEntry
wlanapi
WlanOpenHandle
bthprops.cpl
BluetoothFindFirstRadio
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord35
crypt32
CertFreeCertificateChainEngine
ws2_32
freeaddrinfo
rpcrt4
UuidCreate
psapi
GetModuleInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memmove
api-ms-win-crt-stdio-l1-1-0
__p__commode
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-string-l1-1-0
strspn
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-runtime-l1-1-0
terminate
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-filesystem-l1-1-0
_stat64
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 342KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 931KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.%VU Size: - Virtual size: 21.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DNe Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N"7 Size: 35.4MB - Virtual size: 35.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ