Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Generic.11766800.6393.26010.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Generic.11766800.6393.26010.exe
Resource
win10v2004-20230220-en
General
-
Target
SecuriteInfo.com.Trojan.Generic.11766800.6393.26010.exe
-
Size
182KB
-
MD5
218966c673d32ca82bd809e775c6a37f
-
SHA1
fccc2a40050d34aa39f816ce7e7c69a6c8c3188d
-
SHA256
2ec9e9fed889708c70ef1ece702cef61c84e7428adfb82f1e022e7ca279e425d
-
SHA512
88253fcf1e8787939e440c412194311efbc895bf3d06acf79b78df9d86bf9632b7639eb468b4ddde99b90e252c1273c2a47fabd54801d281d4550eef45ae3bae
-
SSDEEP
1536:3WSZ/khMbWzG3TagkT696evkwLYDHUzSGsnG9m+xYNipEoQ/FY+evxZNwam0cjDl:3WI/Fb9Tab5HAmGpxRpEoQdYB5ZNwl3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.Generic.11766800.6393.26010.exe
Files
-
SecuriteInfo.com.Trojan.Generic.11766800.6393.26010.exe.exe windows x86
a52eac22b3c376cda6d2f2fbde1a8fc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualAllocEx
GetModuleHandleA
GetCurrentDirectoryA
WriteProcessMemory
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
HeapReAlloc
GetLastError
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateRemoteThread
OpenProcess
CreateThread
CloseHandle
GetStringTypeW
GetCurrentProcess
GetModuleFileNameA
GetModuleFileNameW
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
IsProcessorFeaturePresent
HeapCreate
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
GetProcessHeap
user32
MessageBoxA
GetMessageA
LoadIconA
EnumWindows
TranslateMessage
DefWindowProcA
DispatchMessageA
FlashWindowEx
GetWindowThreadProcessId
PostQuitMessage
SendMessageA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
psapi
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ