Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Malware-gen.30674.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.Malware-gen.30674.exe
-
Size
3.7MB
-
MD5
e33d877aeec8818d72035377f935768d
-
SHA1
4ac4a0a50c9ef6da3054bd5323661f02d586c61c
-
SHA256
fbf66aa4641ee40b89b7adeb3479c0e3366991ebbd22c513e25223ac62116141
-
SHA512
7f955bd759fda37f1331c3825713a0d792e989914c432895c2429de636b413b5b890a6d069a349fb200501a02ce0a749c362a30217e896b765f5c7273d783671
-
SSDEEP
98304:w9s1MuuckDr8MzdvX/Rn69WFTrKgVo5cPUjPPKw:wBuiDr8MRXBjF3NWcPUZ
Malware Config
Signatures
Files
-
SecuriteInfo.com.Win32.Malware-gen.30674.exe.exe windows x86
c21097c2852315e171a310c6ddb24202
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueueTimer
user32
SetFocus
gdi32
GetViewportExtEx
advapi32
RegCreateKeyExW
shell32
SHGetSpecialFolderPathW
ole32
CLSIDFromProgID
msimg32
TransparentBlt
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
uxtheme
IsAppThemed
oledlg
OleUIBusyW
gdiplus
GdipDrawImageRectI
ws2_32
WSAStartup
wininet
InternetCloseHandle
iphlpapi
GetAdaptersInfo
winhttp
WinHttpQueryHeaders
quartz
AMGetErrorTextW
oleacc
LresultFromObject
imm32
ImmReleaseContext
winmm
PlaySoundW
winspool.drv
ClosePrinter
msvcrt
strncpy
psapi
GetMappedFileNameW
Sections
.text Size: 2.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sejdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sejdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ