Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1315548.8102.6161.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1315548.8102.6161.exe
Resource
win10v2004-20230220-en
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1315548.8102.6161.exe
-
Size
143KB
-
MD5
4e664ff612cde047acb9fc0b525c586b
-
SHA1
29728b9e204874375118ee1b779ced8d1ff77ee3
-
SHA256
565319aee27c9774d3ea41b967e2913f2168c75448a296310037594c0bed1114
-
SHA512
1bcace8a74c7543a47d3a2398c9a03446c9d70a7ed1d8e456de063ae06dc12eceab48032aafd29261ccc9894206a22ae8792249685893c8fa542d5324d243f99
-
SSDEEP
3072:MBIzhype6L3ifXn31IKvQ+fSYxWfmvEdxHeDjj8l74Jg8639LD2:vzhy4qyf3FIKvQ+fSZf9xHeDjj8+il5C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Heuristic.HEUR.AGEN.1315548.8102.6161.exe
Files
-
SecuriteInfo.com.Heuristic.HEUR.AGEN.1315548.8102.6161.exe.exe windows x86
f80a2198e336339350f718214da6daaf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeServiceDescriptorTable
MmIsAddressValid
KeAddSystemServiceTable
strncmp
IoGetCurrentProcess
strncpy
memset
KeWaitForSingleObject
strstr
_CIsqrt
wcsstr
MmMapLockedPagesSpecifyCache
IofCompleteRequest
PsSetLoadImageNotifyRoutine
KeInitializeEvent
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
_CIsin
_CIcos
KeTickCount
KeBugCheckEx
RtlUnwind
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 422B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ