Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.8372.19917.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.8372.19917.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.TrojanX-gen.8372.19917.exe
-
Size
176KB
-
MD5
e460b7d571b50e5950fdd69feebf2357
-
SHA1
04d5a524e57a760f0bcea873faab604a6364428d
-
SHA256
c42d7a0eb68618cb608daf7de1233989e9704edbf9f8b09a590ac07c378d9fed
-
SHA512
444f6a9bb022eee54090c67534de0873f9f0e28850b49aea7163760bff72e34c61d4c840e0bde66d799c3b9f8f92e87ed1dd3f326d4be621ff6f82a3ad522863
-
SSDEEP
3072:l5t6pFIsBuklZ0P3o6Xwz+MkYdd4FJHUV:l6pqsPF6e9qJ0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.TrojanX-gen.8372.19917.exe
Files
-
SecuriteInfo.com.Win32.TrojanX-gen.8372.19917.exe.exe windows:6 windows x86
d59b0e57881f633c6b260140733c6722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmEscapeA
ImmGetImeMenuItemsW
ImmReSizeIMCC
ImmUnregisterWordW
ImmSetCompositionWindow
ImmGetDescriptionA
ImmGetCompositionWindow
ImmIsUIMessageW
shlwapi
PathFindExtensionW
PathParseIconLocationA
PathStripPathA
UrlCompareW
PathCreateFromUrlA
PathRemoveBackslashW
ChrCmpIA
kernel32
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
GetModuleHandleW
GetProcAddress
EnumTimeFormatsW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
EditWndProc
InvalidateRect
GetForegroundWindow
resutils
ResUtilSetExpandSzValue
ResUtilGetProperty
ResUtilGetDwordValue
ResUtilEnumResources
ResUtilVerifyPropertyTable
ResUtilIsPathValid
ResUtilStartResourceService
ResUtilEnumPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumProperties
wsnmp32
ord104
ord200
ord201
ord203
ord601
oleaut32
VarI2FromI4
VarImp
VarR4FromR8
VarDiv
VarUI4FromUI1
SafeArrayRedim
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yak Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ