Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.32353.16014.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.32353.16014.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.32353.16014.exe
-
Size
301KB
-
MD5
92655ee9fd597b85b09a085a2c21fbe1
-
SHA1
f60f980e9a5c315722b3953638f9f5da85ed4a7e
-
SHA256
fefa50ffd7c9e19b4c4d84e664b894c6377196942024b71ee371c466d194ee9c
-
SHA512
b01ccaf9c11c7ed1d3e2765c2f5590e53ba3ddac41a651298bf92028dccc0120431b91fc430b1cb587b3014f17e386605eba27559aa425e6f8beb7da23dc165c
-
SSDEEP
3072:WGFC2nPsomShMORKs+l5DRWcOQCFOTcCshoPvsAN5N0NUO8J:jF0omShrRTcDRBOLOTcA/Ub
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.PWSX-gen.32353.16014.exe
Files
-
SecuriteInfo.com.Win32.PWSX-gen.32353.16014.exe.exe windows:5 windows x86
04c2204ccf7af76dc6a24e22c76c351e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetDriveTypeW
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
MoveFileExW
InterlockedDecrement
CreateJobObjectW
SetHandleInformation
GetProfileStringW
AddConsoleAliasW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasExesW
EnumTimeFormatsA
EnumTimeFormatsW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
TerminateThread
FatalAppExitW
GetStartupInfoW
CreateMailslotW
RaiseException
GetPrivateProfileIntW
InterlockedExchange
SetLocaleInfoA
SetThreadLocale
GetLastError
GetCurrentDirectoryW
BackupRead
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessId
LocalAlloc
GetNumberFormatW
GlobalGetAtomNameW
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
OpenSemaphoreW
FindAtomW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DeleteFileW
CreateFileW
ReadFile
FlushFileBuffers
FindFirstFileW
SetDefaultCommConfigA
GetCommandLineW
GetFileSize
GetComputerNameA
GetStartupInfoA
WriteConsoleW
SetStdHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
GetComboBoxInfo
CharUpperW
gdi32
SelectPalette
GetTextFaceW
GetBoundsRect
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ