Static task
static1
Behavioral task
behavioral1
Sample
Gen_Spoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
Gen_Spoofer.exe
-
Size
20.5MB
-
MD5
5d04b8d0e731ebe7be4415026b06f997
-
SHA1
a215cf1862b8515f75def29f23c10cd56afc5cec
-
SHA256
236e81a2705d696faed49a7dbc0392198819ffd70417d79e73d1f2359a3b56e4
-
SHA512
445c8d28eb86a8ce04fde6db8ead60486d727253485dde5192af9dab1ab338554407c650e35fd49381ee6071b5aa8848f36b04dbedaf52f40293016303351b08
-
SSDEEP
393216:reYQs8eb59i4rRh3rtqGPzcCpNoYYeTvWwWe3inzc35fJYPNK768lz:rlJ88JVVrtqGPzTNYNng3RJn6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Gen_Spoofer.exe
Files
-
Gen_Spoofer.exe.exe windows:6 windows x64 arch:x64
70eb513505715b029f562dfb370a6827
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryA
user32
MessageBoxW
advapi32
SetSecurityInfo
shell32
ShellExecuteA
ole32
CoSetProxyBlanket
oleaut32
VariantClear
msvcp140
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
ntdll
RtlLookupFunctionEntry
wininet
InternetReadFile
shlwapi
PathFindFileNameW
normaliz
IdnToAscii
wldap32
ord79
crypt32
CertFreeCertificateChain
ws2_32
listen
rpcrt4
RpcStringFreeA
psapi
GetModuleInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memmove
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-multibyte-l1-1-0
_mbsrchr
api-ms-win-crt-runtime-l1-1-0
system
api-ms-win-crt-stdio-l1-1-0
_lseeki64
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-string-l1-1-0
strcat_s
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-utility-l1-1-0
qsort
Sections
.text Size: - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 893KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.,QW Size: - Virtual size: 8.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.k02 Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t-R Size: 20.3MB - Virtual size: 20.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ