Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Malware-gen.12560.24012.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Malware-gen.12560.24012.dll
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.Win32.Malware-gen.12560.24012.dll
-
Size
321KB
-
MD5
1416fb62c95abd0a2f9cfaa00cef7def
-
SHA1
511420caf14897f9856c8d0396b44f54188216c1
-
SHA256
7b49291f7c14012de5a6196bdc14ccbb891f526e8e49ab0e306b28ebc5294d14
-
SHA512
3e3a05986b057c7e14b197b484130e2ced6e03bfc98fef2fca3a6c5d96fd363edd0f76c7a345b939327527ce5790f976453fc26efa64ea55f351723843de9b4e
-
SSDEEP
6144:vkzM+StUx4l4lt+7Su6EnA8p21yV0bI38RNOve7dl2zFwoh7ol:MFx46t+WuvnA8pGyMI38RUykzio1ol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win32.Malware-gen.12560.24012.dll
Files
-
SecuriteInfo.com.Win32.Malware-gen.12560.24012.dll.dll windows:4 windows x86 arch:x86
3928488066195d0bd09395041885dcf0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
DbgPrint
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteSymbolicLink
KeServiceDescriptorTable
PsGetVersion
IofCompleteRequest
MmIsAddressValid
KeAddSystemServiceTable
_except_handler3
PsGetCurrentProcessId
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ