Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Jaik.109900.16212.4842.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Jaik.109900.16212.4842.exe
Resource
win10v2004-20221111-en
General
-
Target
SecuriteInfo.com.Variant.Jaik.109900.16212.4842.exe
-
Size
78KB
-
MD5
5002421cd2c4cfc03ab3d864059ff438
-
SHA1
5b43d1b0c9e021b1c5dd74713f810e8ca3e7969c
-
SHA256
2a590d0124a3b8e47995ed20f82f6399179130b606c90b0eea4c5488ab73228c
-
SHA512
fc5c7cce0d16ab1e6b0e1e2597614ae3879f1e63f69bf3ce4d77158d87b4f05bf3e3a8a6f8d1f07dd1f22698c088a8238eca247f4218c4d72fd94e8899cddd62
-
SSDEEP
768:VRcTKJCJXLwRxO6UarltCXIuXU4AGe00N0bYUgE8suPejINKNWUPXgjH2gyKZsu:77JCJQnpYXZPe0gzsuPeVzw72umu
Malware Config
Signatures
Files
-
SecuriteInfo.com.Variant.Jaik.109900.16212.4842.exe.exe windows x86
bfbf5b1a1d8eb185472f9d140d7f5dbc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreateToolbarEx
ord17
CreateStatusWindowW
kernel32
MultiByteToWideChar
lstrlenW
GlobalUnlock
VirtualAlloc
lstrcatW
CloseHandle
GetWindowsDirectoryW
lstrcpyW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
GetStringTypeW
WideCharToMultiByte
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
IsDebuggerPresent
GetCPInfo
GetOEMCP
GetACP
lstrcmpW
Sleep
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TerminateProcess
GetCurrentProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
GetModuleFileNameW
WriteFile
GetStdHandle
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
EncodePointer
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
SetLastError
GetLastError
IsProcessorFeaturePresent
GetCommandLineW
CreateFileW
ReadFile
GetConsoleWindow
GlobalAlloc
EnumLanguageGroupLocalesW
GetProcessHeap
GlobalLock
HeapFree
CreateProcessW
WriteConsoleW
GetFileSize
IsValidCodePage
odbc32
ord152
ord233
ord16
ord135
ODBCInternalConnectW
ord44
setupapi
SetupInitializeFileLogW
SetupRemoveFromDiskSpaceListW
SetupDiOpenClassRegKey
SetupAdjustDiskSpaceListA
SetupDiOpenDeviceInfoA
SetupDiClassGuidsFromNameA
SetupDiGetHwProfileListExW
user32
LoadCursorFromFileA
GetKeyboardLayout
DestroyWindow
GetWindowTextLengthW
CloseClipboard
TranslateAcceleratorW
GetMessageW
PostQuitMessage
DialogBoxParamW
LoadCursorW
GetClientRect
SetFocus
GetMonitorInfoW
TranslateMessage
LoadAcceleratorsW
GetMenu
GetWindowTextW
EnableMenuItem
EmptyClipboard
GetDlgItem
EndDialog
CheckDlgButton
LoadStringW
ShowWindow
IsDlgButtonChecked
CreateWindowExW
OpenClipboard
MessageBoxW
RegisterClassW
IsWindowVisible
SendMessageW
UpdateWindow
SetClipboardData
SetWindowTextW
DefWindowProcW
CheckMenuItem
MoveWindow
DispatchMessageW
AppendMenuW
ShowWindowAsync
DdeQueryStringA
ActivateKeyboardLayout
IsClipboardFormatAvailable
ValidateRgn
wsprintfW
mapi32
ord188
ord62
ord159
ord68
ord172
ole32
OpenOrCreateStream
IsEqualGUID
HWND_UserFree
OleInitializeWOW
HBITMAP_UserMarshal
OleConvertOLESTREAMToIStorageEx
UtConvertDvtd16toDvtd32
CLSIDFromString
OleInitialize
OleUninitialize
HMENU_UserFree
ws2_32
gethostbyname
WSAEnumNameSpaceProvidersW
WSAResetEvent
send
WSASetBlockingHook
msacm32
acmDriverRemove
acmDriverAddA
acmStreamConvert
acmFormatChooseW
acmStreamReset
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetAddConnectionW
WNetDisconnectDialog
WNetGetResourceParentW
WNetGetConnectionA
WNetGetResourceParentA
comdlg32
GetOpenFileNameW
advapi32
RegOpenKeyW
RegSetValueExW
RegCloseKey
RegEnumValueW
RegGetValueW
RegCreateKeyW
RegEnumKeyW
RegQueryValueW
shell32
ShellAboutW
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ