Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.31919.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.31919.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.31919.8047
-
Size
150KB
-
MD5
98ac84432907f79e1b44b9c94508b66f
-
SHA1
d737b01a2fdcf63e42eebf103c0bf3c54dad7586
-
SHA256
7494aaada7d72cf65ede05a3d8da6b1f9573ba52b7137e9faf54b8649e89a106
-
SHA512
70b75ae0f3aa902ba3dfb0c8603dee2cc55504305d379eb52e2a346c5e33e3e50e1afda0f00b98173116984c4c19069f689fa23ec84da438b2905c13cc2a7248
-
SSDEEP
3072:KTqtnLNWwgW1GHz64fqjTM+N1DcO8PNXywkdQ:KT25WI1GHz63jYpiP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.PWSX-gen.31919.8047
Files
-
SecuriteInfo.com.Win32.PWSX-gen.31919.8047.exe windows x86
030885450982d51291b02eee8d036a4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCmpNIA
kernel32
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadFile
EnumTimeFormatsW
VirtualAlloc
SetCommMask
lstrcpy
LoadLibraryExA
FileTimeToDosDateTime
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
GetModuleHandleW
TerminateProcess
GetCurrentProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
InitOnceExecuteOnce
GetFileType
GetProcessHeap
GetCurrentThreadId
SetLastError
IsDebuggerPresent
HeapSize
GetProcAddress
GlobalAlloc
Beep
CreateFileW
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
WideCharToMultiByte
GetLocaleInfoEx
MultiByteToWideChar
GetStringTypeW
RaiseException
RtlUnwind
GetCommandLineW
GetLastError
HeapFree
InitializeCriticalSectionAndSpinCount
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
mswsock
GetTypeByNameW
NPLoadNameSpaces
rexec
GetAcceptExSockaddrs
GetNameByTypeW
MigrateWinsockConfiguration
WSARecvEx
winspool.drv
GetPrinterDriverDirectoryA
OpenPrinterW
GetPrinterDriverW
EnumPrinterDataExA
ord210
AddPrinterConnectionW
StartDocPrinterW
wininet
GopherGetLocatorTypeW
InternetCrackUrlA
InternetCheckConnectionW
FtpRenameFileW
GetUrlCacheEntryInfoExA
gdi32
ResetDCA
GetCharWidthA
SetWindowOrgEx
ExtEscape
SetColorAdjustment
GdiPlayDCScript
shell32
SHQueryRecycleBinA
ExtractIconEx
SHGetSettings
ShellHookProc
resutils
ResUtilGetPropertySize
ResUtilGetProperties
ClusWorkerTerminate
ResUtilDupString
ResUtilSetMultiSzValue
ResUtilEnumPrivateProperties
ResUtilPropertyListFromParameterBlock
ResUtilFindDwordProperty
mpr
MultinetGetConnectionPerformanceW
WNetGetLastErrorA
WNetGetNetworkInformationA
WNetCancelConnection2A
WNetAddConnection2A
WNetConnectionDialog1W
WNetGetNetworkInformationW
rpcrt4
NdrConformantVaryingArrayBufferSize
I_RpcTransConnectionReallocPacket
RpcServerListen
RpcIfInqId
NdrEncapsulatedUnionFree
RpcServerUseProtseqIfW
advapi32
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ