Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Mikey.158453.23397.420.exe
Resource
win7-20231023-en
General
-
Target
SecuriteInfo.com.Variant.Mikey.158453.23397.420.exe
-
Size
369KB
-
MD5
d89e5318f31e89ef248b5512bafa36dd
-
SHA1
550fdee5fa1e20446d15900cefa46daea57226e8
-
SHA256
9672eb651f72a3dc2a2b676d56d5e3424392123e3ae883719097af836129eb34
-
SHA512
75e28a7cdc4aca62e8c0eeeb65845b7031a80fa8151301591383768a993f60301f8c4170656d722b9499b6369551cbac2de0bb442c36c133fda24a4c6041959e
-
SSDEEP
3072:wAMbXIVuWJGt0UzoDtFsFda1W9bijvN4VL4J:wbbY4HpFwo9bOmL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Variant.Mikey.158453.23397.420.exe
Files
-
SecuriteInfo.com.Variant.Mikey.158453.23397.420.exe.exe windows:4 windows x86
edf46b6a9aceeebc55eb9cb33ed4d508
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryA
FlushFileBuffers
Module32First
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
InterlockedDecrement
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
RaiseException
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
user32
SendMessageA
DialogBoxParamA
LoadIconA
GetDlgItem
EndDialog
GetDesktopWindow
GetWindow
wsprintfA
MessageBoxA
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
ole32
CoUninitialize
CoInitialize
oleaut32
VarR8FromCy
VarR8FromBool
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
atl
ord42
ord47
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE