Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Midie.120421.5038.30900.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Midie.120421.5038.30900.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Variant.Midie.120421.5038.30900.exe
-
Size
84KB
-
MD5
71f20b057e7cdcfa0052971862a0a4fc
-
SHA1
5168555af9de34f0a83372e89222621b79f34ab5
-
SHA256
6e590ad5a609a6a7eb8da1b1a04f40e28856358e82842c59a0b44204ef89f477
-
SHA512
9b96d32bc190cbeccfd2746601c99c125451807e1d5cd729887fa24b3e405cc61f5893ee698764b330bc4e98611bb648ec1552eeac10dbcebfc801b6ad9c3f0f
-
SSDEEP
1536:JfyDOjSDHATN2kT9nuEj8t2fkf04ZQ+53fSnNMdTpx+zyIJEcsWB3ecdvqf:jScR2kT9uOmf04ZQ+53fSETvIi4v8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Variant.Midie.120421.5038.30900.exe
Files
-
SecuriteInfo.com.Variant.Midie.120421.5038.30900.exe.exe windows x86
e5c2ba31dc0f58e9ced1780c10fa3390
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmGetConversionListW
ImmGetCandidateListW
ImmGetCandidateListCountA
ImmCreateSoftKeyboard
ImmRequestMessageA
ImmIsUIMessageA
shlwapi
StrStrIW
kernel32
DecodePointer
GetModuleHandleW
GetProcAddress
WriteConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetConsoleCP
FlushFileBuffers
CloseHandle
CreateFileW
GetProcessHeap
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
SetFilePointerEx
ReadConsoleW
GetConsoleMode
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
ReadFile
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
wsock32
ord1117
ord1119
ord1142
ord1141
ord1110
WSACleanup
inet_addr
WSAAsyncSelect
ord1140
recv
bind
getsockopt
WSAAsyncGetProtoByName
WSAAsyncGetProtoByNumber
gethostbyaddr
WSAStartup
ord1100
inet_ntoa
ord1107
setsockopt
winmm
GetDriverModuleHandle
midiOutPrepareHeader
sndPlaySoundA
midiOutGetDevCapsA
mapi32
ord178
ord174
ord154
ord138
ord181
ord19
ord36
ord165
ord34
user32
RegisterClassA
EnumWindows
DrawFocusRect
DrawIconEx
IsDialogMessageA
CharLowerBuffW
CreateDialogIndirectParamW
FindWindowA
MonitorFromRect
wininet
GopherOpenFileW
InternetQueryDataAvailable
InternetAutodialCallback
InternetOpenW
CommitUrlCacheEntryA
ShowX509EncodedCertificate
FindFirstUrlCacheContainerW
shell32
SHGetPathFromIDListW
DragFinish
DragQueryPoint
ws2_32
WSAWaitForMultipleEvents
WSCInstallProvider
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ