Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.AdwareX-gen.5623.20634.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.AdwareX-gen.5623.20634.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.AdwareX-gen.5623.20634.exe
-
Size
172KB
-
MD5
ca2da2eb4e34c59a146d0ffe187792cf
-
SHA1
9369c89c54f186aa9189a38c2485009266564adc
-
SHA256
3229aa0b9a5762b05b0bdacb89a6f463195abff02b8f41d2cfb7e8287b9ac9f0
-
SHA512
db6e1c641b70c15cbaa31d82ec53cb3aa06e34d9c133045045777b3b57c3e6d4157890078938d8f438678104498f66bc93aad52514d55acc8c3ab79a0d5d2345
-
SSDEEP
1536:2VRONLiAokWGsuPqGNzqrLaveF9EqRDVF21Wj2s6bI+qchnMzs8jcd0dg6UEGSLl:oROMxHUC9PR5y0+ZnMG0dglEnskL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.AdwareX-gen.5623.20634.exe
Files
-
SecuriteInfo.com.Win32.AdwareX-gen.5623.20634.exe.exe windows:6 windows x86
d91f4e42d0883f4089cb34346b401fab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCombineA
PathAddBackslashW
PathIsPrefixA
UrlCreateFromPathA
StrCSpnW
StrPBrkA
StrToIntExA
kernel32
GetCPInfo
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
ReadConsoleOutputW
GetTempPathW
LCMapStringW
GetUserDefaultLangID
LockResource
LocalReAlloc
GetModuleHandleA
GetProcAddress
EnumTimeFormatsW
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
IsDebuggerPresent
GetProcessHeap
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
InitializeCriticalSectionAndSpinCount
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsProcessorFeaturePresent
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapSize
ws2_32
WSASetBlockingHook
getpeername
ntohs
WSASetServiceA
WSALookupServiceBeginW
wsnmp32
ord604
ord900
ord904
ord503
ord301
ord204
ord502
ord206
ord906
ord605
mswsock
GetAddressByNameA
getnetbyname
dn_expand
WSARecvEx
GetAddressByNameW
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ