Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.12083.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.12083.dll
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.12083.1499
-
Size
2.3MB
-
MD5
a5732b1cb868c07c385faece285eff67
-
SHA1
6160b20d4cbb3708009598df637b6556f1df8ba6
-
SHA256
f89acc22c624b75318f62f18ddc27a20ffb35eeb90c1f0fd176193c82c6f5718
-
SHA512
20a67934191c53793b9a21b61cd2a5fd62bf8ba1164998e171e35e5f3fa3d69c2b885cc30cd7f716c74c39cf7dbd6195c69bbd4cdb6b798f7d92fab29c9cc346
-
SSDEEP
49152:ibZdYkpKR7QFsmarl3pAdofzbGyrVDpK9HVVDmJqJ38bS:ibPQisFhWdofzbGAVDpK9HHJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.DropperX-gen.12083.1499
Files
-
SecuriteInfo.com.Win32.DropperX-gen.12083.1499.dll windows x86
d24cbb1e1eff66791f333e2dee6d0919
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
RegCloseKey
oleaut32
GetRecordInfoFromGuids
ole32
CreateStreamOnHGlobal
kernel32
GetProcessHeap
TerminateProcess
WaitForSingleObject
SetStdHandle
CreateProcessW
GetModuleFileNameA
LoadLibraryA
CloseHandle
LoadLibraryW
GetProcAddress
EnterCriticalSection
Process32FirstW
VerLanguageNameA
DeleteCriticalSection
setupapi
SetupDiDestroyDeviceInfoList
shell32
SHGetPathFromIDListW
SHFormatDrive
version
GetFileVersionInfoW
lz32
LZInit
LZRead
mscms
EnumColorProfilesW
user32
ShowWindow
RegisterClipboardFormatW
CreateWindowExA
DefWindowProcA
IsClipboardFormatAvailable
CharLowerW
gdi32
GetMapMode
CreateFontA
EnumFontFamiliesExW
InvertRgn
SetDIBColorTable
comdlg32
ChooseColorA
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erloc Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
66Fjrs Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
smkjYYW Size: 968KB - Virtual size: 964KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ