jkgznpukyk
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.MalwareX-gen.20181.21246.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.MalwareX-gen.20181.21246.dll
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.MalwareX-gen.20181.21246.dll
-
Size
92KB
-
MD5
952727c425a5f62291da51b54244af67
-
SHA1
954b303c1cda0ceb9bb02f50c8fb65f8df77a7c4
-
SHA256
9bef715db0e681cd6fe3f8d20b629a36f47b55899cc52b6a6d63f4bb97c6dd01
-
SHA512
540e56b48d974bc6ed8480335d73b1b9bc60e66f314589c38e77aad9bfb58aaa2bc2809d1663114a73a62f805716cf21a33f6923bd2582da18b5b28ac86f2da4
-
SSDEEP
1536:pBk18hsu0xIHTWGUizGPBwq78ECm1xc8809rrsWjcdxIPcX:z6nxoWGUi8BzdfTtUSPcX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.MalwareX-gen.20181.21246.dll
Files
-
SecuriteInfo.com.Win32.MalwareX-gen.20181.21246.dll.dll windows:6 windows x86
d12a26d2f41758fa430ff97482f5a284
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
lstrcmpW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
EnumSystemCodePagesW
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
OutputDebugStringW
GetStringTypeW
HeapReAlloc
RtlUnwind
LoadLibraryExW
GetModuleFileNameW
WriteFile
IsDebuggerPresent
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
GetFileType
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
EncodePointer
SetLastError
CreateFileW
IsProcessorFeaturePresent
GetCurrentProcess
WaitForSingleObject
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
DeleteFileW
GetCurrentThreadId
GetCommandLineA
ole32
CoInitialize
CoTaskMemAlloc
OleConvertOLESTREAMToIStorageEx
CLSIDFromString
OleInitializeWOW
CoUninitialize
STGMEDIUM_UserFree
HPALETTE_UserUnmarshal
StgCreatePropSetStg
WriteClassStm
CoCreateGuid
StringFromGUID2
CoCreateInstance
wsock32
ord1111
ord1104
ord1113
ord1116
WSAAsyncGetHostByAddr
ord1100
ord1117
WSASetBlockingHook
recvfrom
ord1115
WSACancelBlockingCall
oleaut32
VariantClear
VarI1FromDate
VarCyFromStr
SysFreeString
SysAllocString
VarBstrFromDec
VarUI2FromDec
VarFormatCurrency
wsnmp32
ord606
ord905
ord104
ord206
ord604
ord600
ord602
msi
ord23
ord156
ord14
ord27
ord109
rtutils
TraceDeregisterExW
TraceVprintfExW
TraceGetConsoleA
RouterLogRegisterA
RouterLogEventDataA
TracePrintfW
rtm
MgmRegisterMProtocol
RtmCreateEnumerationHandle
RtmBlockSetRouteEnable
MgmDeInitialize
RtmCloseEnumerationHandle
setupapi
SetupAddToSourceListA
SetupAdjustDiskSpaceListA
SetupCommitFileQueueA
SetupDecompressOrCopyFileA
advapi32
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
RegGetValueW
shell32
SHGetFolderPathW
SHCreateDirectoryExW
Exports
Exports
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ