Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Genome.9505.12814.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Win32.Genome.9505.12814.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Trojan.Win32.Genome.9505.12814.exe
-
Size
379KB
-
MD5
a05809a2cd11c14fa4172d6afa2df6b2
-
SHA1
f14fdd15eb2265968b53aabbee59b1cdb5402c8a
-
SHA256
2f455e6245fa4762f8f8ad94ac2fbabb821046ba6033de070a454c60e00cfc28
-
SHA512
71c1a132f9a8634019b0904e6cfc065138264e85faf0a37e11cef2fc3f9f55b7560330abcebf97270f6851e7d74ec7206efcbbaea1647553b6a99db2005dc1b3
-
SSDEEP
1536:UFruvDlFLwKtd1ENU7SCKP8WKKKvlaCL7gjZu40CRrHlxyC7/b5mf+Rix:UiTZnDEjH5mWRix
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.Win32.Genome.9505.12814.exe
Files
-
SecuriteInfo.com.Trojan.Win32.Genome.9505.12814.exe.exe windows x86
c4e415dc20169c8bc984bc9acaf759d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
ExitProcess
GetWindowsDirectoryA
lstrcatA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateFileA
WriteFile
CloseHandle
OpenProcess
VirtualAllocEx
WriteProcessMemory
LoadLibraryA
GetProcAddress
CreateRemoteThread
user32
DialogBoxParamA
SetTimer
LoadBitmapA
SendDlgItemMessageA
EndDialog
FindWindowA
GetWindowThreadProcessId
GetDlgItem
SendMessageA
RegisterHotKey
ReleaseCapture
gdi32
CreateFontA
SetBkMode
SetTextColor
SetBkColor
CreateSolidBrush
GetStockObject
Sections
code Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ