Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.InjectorX-gen.4790.17012.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.InjectorX-gen.4790.17012.exe
Resource
win10v2004-20231025-en
General
-
Target
SecuriteInfo.com.Win32.InjectorX-gen.4790.17012.exe
-
Size
160KB
-
MD5
f8cfd1a3bc18498c812ade7422f2fe57
-
SHA1
deb977ad561e9bb6cfa543bb9a5697ade5da1caf
-
SHA256
382866d2f2304ef11667ff45961e9586f65be0fe498dac88786f1503d1bba34e
-
SHA512
148841351b1e580dffad99f41cbb2fa81cdde91701174c30e13d61d89825843a31d17b0a8a43226761904954dab6213e11649d7f34e9f145c51644275fbdb5c3
-
SSDEEP
3072:Fn2jd5FsmJrFguZY/gSrqWJZeY8PIZeTaTWVL7h3oZShXug5Ecp:92jd5z4SY/gRyZelaeLCShJp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.InjectorX-gen.4790.17012.exe
Files
-
SecuriteInfo.com.Win32.InjectorX-gen.4790.17012.exe.exe windows:6 windows x86
4962683fea14d8677b27271b978ee1d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIW
kernel32
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
CreateFileW
FlushFileBuffers
CloseHandle
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
LoadLibraryExW
FreeLibrary
HeapSize
EnumSystemCodePagesW
LoadLibraryA
GetProcAddress
Sleep
GetProcessHeap
HeapAlloc
WriteConsoleW
GetConsoleOutputCP
DeleteCriticalSection
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
GetLastError
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
GetModuleHandleW
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
SetEndOfFile
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
resutils
ResUtilGetPrivateProperties
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilSetSzValue
ResUtilFindSzProperty
ResUtilFindDwordProperty
ws2_32
send
WSAAsyncGetProtoByNumber
gethostname
closesocket
setsockopt
WSANtohl
user32
SendInput
LoadKeyboardLayoutA
GetScrollInfo
GetKeyboardLayoutNameA
CharToOemBuffA
SetActiveWindow
GetMenu
mswsock
EnumProtocolsW
sethostname
rcmd
getnetbyname
AcceptEx
NPLoadNameSpaces
MigrateWinsockConfiguration
WSARecvEx
shell32
SHFileOperationW
ShellExecuteA
ExtractIconExA
SHFileOperationA
DragQueryFileA
DoEnvironmentSubstW
pdh
PdhEnumObjectsW
PdhVbGetCounterPathElements
PdhUpdateLogA
PdhOpenQueryW
PdhUpdateLogW
gdi32
CreatePolygonRgn
GetDeviceCaps
ExtCreatePen
GetCharWidthI
GetROP2
GetTextExtentPoint32W
RemoveFontResourceExA
CreateScalableFontResourceA
GdiGetDevmodeForPage
setupapi
SetupDiGetSelectedDriverW
SetupDiInstallDeviceInterfaces
SetupPromptForDiskA
SetupDiOpenDevRegKey
SetupCommitFileQueue
SetupLogErrorW
SetupDefaultQueueCallbackW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantInit
SysAllocString
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ