Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Jaik.69900.24072.25877.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Jaik.69900.24072.25877.exe
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.Variant.Jaik.69900.24072.25877.exe
-
Size
110KB
-
MD5
017e4ed1878079a91fd33880dd93e3d2
-
SHA1
f78762d7f448c8274a3e27d46810672ff70bc46e
-
SHA256
eb8368e401131169c1684af0b8889909cf99e3a63ed000c005852094256728b9
-
SHA512
a7a30ee8df230fdf7dfeda6d868b0a8411cb7b0b8b09ecdde9bb139b30262b574d12652d0d4d833d91083d14aa4044e747bb9f135394567f9d9897d25d16bdde
-
SSDEEP
3072:X/v8hXXCvYgLkH19FwMXMEhBOsVbQ+rxS9gPKW4DqRlL+sbR0OP00009aaaaaaa:XcFXZJbF/DPQ19/C0000
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Variant.Jaik.69900.24072.25877.exe
Files
-
SecuriteInfo.com.Variant.Jaik.69900.24072.25877.exe.exe windows:6 windows x86 arch:x86
021206ee13aec901f3b8a6de78e87691
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmGetImeMenuItemsA
ImmDestroyIMCC
ImmGetGuideLineW
shlwapi
PathAddBackslashW
PathFindExtensionW
kernel32
WriteConsoleW
CreateFileW
FindClose
FindFirstFileW
FindNextFileW
WriteFile
CloseHandle
VirtualProtect
lstrcmpW
lstrcpyW
lstrcatW
lstrlenW
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
LCMapStringW
CompareStringW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
ExitProcess
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
DecodePointer
odbc32
ord35
ord256
ord219
ord117
ord49
ord245
ord108
oleaut32
VarR4FromI2
VarUI1FromDate
VarR8FromR4
SafeArrayDestroyData
VarBoolFromI2
VarBstrFromR8
setupapi
SetupDiDestroyClassImageList
SetupSetDirectoryIdExA
SetupOpenInfFileW
SetupDiDrawMiniIcon
SetupDiSelectDevice
SetupSetSourceListA
mswsock
GetTypeByNameA
dn_expand
AcceptEx
NPLoadNameSpaces
sethostname
GetAddressByNameA
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ