C:\Users\illya\source\repos\HWIDSpoofer\HWIDSpoofer\obj\Debug\HWIDSpoofer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
HWIDSpoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
HWIDSpoofer.exe
-
Size
27KB
-
MD5
9a58432cc1385345413eec39008b998f
-
SHA1
3894aa7e4d2256e13e42e36a27828b01684a0baf
-
SHA256
51c2e751338cbb1ec12714a0fdee7e96536132015542c6252d02b223740ddfa2
-
SHA512
adbb0090e84f554c17e3caf13e85fb3968955b7e943af231adef8474fc687beb821eeee1e16ab8a0c9f9cd1e05c8fe08188325b6f06f342a6a7500c834c5fdec
-
SSDEEP
768:ujab+Td2cfhK2JPHVcez0GHYtYcFwVc6K:umbupKWVhzB0wVcl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HWIDSpoofer.exe
Files
-
HWIDSpoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ