Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Fragtor.373799.26754.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Fragtor.373799.26754.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Variant.Fragtor.373799.26754.2221
-
Size
176KB
-
MD5
936c00d674856457c923c47d63becd6c
-
SHA1
8eb3eaa6b1a1c6ea1d03fc35ddb94f47185a7208
-
SHA256
505727b56d70693677cd53bf8e29770f00f0a98b5eb741c3f98621f96f8d5514
-
SHA512
006d071413962faa85dfedecec91bd48fb8028e2de95bc64af580be4adeae37dce75eb3ac085895d4b242d2e201c218a2b0a5be5879849d2f192b185a563e3f1
-
SSDEEP
3072:8p5t6pFIsBuklZ0P3o6Xwi+MkYdd4FvKHUV:8p6pqsPF6b9qS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Variant.Fragtor.373799.26754.2221
Files
-
SecuriteInfo.com.Variant.Fragtor.373799.26754.2221.exe windows:6 windows x86
d59b0e57881f633c6b260140733c6722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmEscapeA
ImmGetImeMenuItemsW
ImmReSizeIMCC
ImmUnregisterWordW
ImmSetCompositionWindow
ImmGetDescriptionA
ImmGetCompositionWindow
ImmIsUIMessageW
shlwapi
PathFindExtensionW
PathParseIconLocationA
PathStripPathA
UrlCompareW
PathCreateFromUrlA
PathRemoveBackslashW
ChrCmpIA
kernel32
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
GetModuleHandleW
GetProcAddress
EnumTimeFormatsW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
EditWndProc
InvalidateRect
GetForegroundWindow
resutils
ResUtilSetExpandSzValue
ResUtilGetProperty
ResUtilGetDwordValue
ResUtilEnumResources
ResUtilVerifyPropertyTable
ResUtilIsPathValid
ResUtilStartResourceService
ResUtilEnumPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumProperties
wsnmp32
ord104
ord200
ord201
ord203
ord601
oleaut32
VarI2FromI4
VarImp
VarR4FromR8
VarDiv
VarUI4FromUI1
SafeArrayRedim
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yak Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ