s_activate
s_filestream
s_get_expiry
s_get_level
s_get_response
s_get_username
s_init
s_log
s_login
s_registr
s_token
s_var
Static task
static1
Behavioral task
behavioral1
Sample
Sentinal.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sentinal.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
mirage.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mirage.exe
Resource
win10v2004-20240802-en
Target
mirage (extract.me).zip
Size
7.8MB
MD5
7af1f13d0ff2a634c8758bb82c84d7f3
SHA1
9cdb27b3ba89b2fa0ece6b37ffdeaec1ec470de2
SHA256
6c58ee32b850b99c4aefb0eb18797b0e14d3c380e03c686bd82865a42fbd39c0
SHA512
ef87bbb48cca9d604236ec52eaae2969af4439651ff43886c2c4c11410e364ea751d8744fcbc13d6714105e516dddc68fd64817bf4775eeacdf004bf26f72f8e
SSDEEP
98304:1RnZs7Axneqj5Ie8p/uWSMs8EJDSJgn66jd8q/80Zt2IHjG5phrNYj2VJkAAvhhA:G75iI/p/u2s8E4eTj80ZJjwNfJkfvTI
Checks for missing Authenticode signature.
resource |
---|
unpack001/Sentinal.dll |
unpack001/mirage.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
getaddrinfo
ord41
CertFreeCertificateContext
ReportEventW
RegCloseKey
WideCharToMultiByte
GetModuleHandleA
MessageBoxA
DefWindowProcW
ShellExecuteA
SHGetDiskFreeSpaceA
PathFindFileNameA
UnloadUserProfile
RpcStringFreeA
BCryptGenRandom
ImageNtHeader
WinVerifyTrust
s_activate
s_filestream
s_get_expiry
s_get_level
s_get_response
s_get_username
s_init
s_log
s_login
s_registr
s_token
s_var
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LoadLibraryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
TranslateMessage
CreateSolidBrush
RegSetKeyValueW
SHGetFolderPathW
s_token
?widen@?$ctype@_W@std@@QEBA_WD@Z
D3D11CreateDeviceAndSwapChain
RtlInitUnicodeString
ImmGetContext
D3DCompile
DwmExtendFrameIntoClientArea
__CxxFrameHandler4
memset
_set_new_mode
__p___argv
floorf
fputc
_unlock_file
atof
_localtime64
srand
strcmp
_configthreadlocale
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ