Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.MalwareX-gen.1365.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.MalwareX-gen.1365.exe
Resource
win10v2004-20231023-en
General
-
Target
SecuriteInfo.com.Win32.MalwareX-gen.1365.22378
-
Size
176KB
-
MD5
f85139647033d100296f0add71658ef7
-
SHA1
1e817ef18b32224c74f0808f1dfac71873801b84
-
SHA256
af7e7e4341c13c0f278abddaf53e09e1ca121cd05dba99503e9e8fe6e7908647
-
SHA512
fff91677f7a0b2ed48ba9daf537ddd9fabbf6b7bd6ede59f2fbef4d9e6f257d7125c58a9bc4c2b939a643c029c6660b41f3cf518bf5122802e16dc0d6340d6ef
-
SSDEEP
3072:3XSVZIEfSIyW5TzAWhI3LIXPNiKDCLbKr+qNixKc8:3XSUQSoEUmAFDcb8j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.MalwareX-gen.1365.22378
Files
-
SecuriteInfo.com.Win32.MalwareX-gen.1365.22378.exe windows:6 windows x86 arch:x86
dcb14c7ca3401c4393a09e7699a2e676
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathW
GetTimeFormatW
GenerateConsoleCtrlEvent
GetFileSize
GetVersionExA
GetConsoleAliasesW
BuildCommDCBA
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
VirtualAlloc
EnumSystemCodePagesW
GetConsoleWindow
SetEndOfFile
CreateFileW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
GetThreadTimes
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
GetModuleFileNameA
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
CloseHandle
GetProcessHeap
IsDebuggerPresent
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
GlobalFlags
SetConsoleMode
GetCPInfoExW
HeapSize
AreFileApisANSI
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineA
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
odbc32
ord33
ord24
ord10
oleaut32
VarI1FromCy
VarCyAdd
VarR8FromR4
VarUI1FromI1
winmm
mmioFlush
mmioSendMessage
SendDriverMessage
midiOutUnprepareHeader
sndPlaySoundA
midiInStart
msi
ord21
ord22
ord88
ord160
ord25
ord148
ord159
ord135
ord74
rtm
RtmCloseEnumerationHandle
MgmDeRegisterMProtocol
RtmGetNetworkCount
RtmLookupIPDestination
MgmTakeInterfaceOwnership
RtmDeleteRoute
MgmGetFirstMfe
crypt32
CertCompareCertificate
CryptFormatObject
CertOpenSystemStoreA
user32
ShowWindow
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE