Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.Downware.10736.30792.32130.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.Downware.10736.30792.32130.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Adware.Downware.10736.30792.32130.exe
-
Size
694KB
-
MD5
f03edee23a37e234a746c2b5f4912075
-
SHA1
aec4501722383067602b4ae9c6673dad420b8f32
-
SHA256
4643347149a3a00afa90c699090ea137c4623731b8de0033f7330d85d1c85ceb
-
SHA512
e3a849ab3cf8894a86eb52ef5a8ca337600735cc839bd607cc3b0f0b3ed3424c68857c1cee21c036ef5ed02e7d01167a9df88126436f6b61963e6e521661523a
-
SSDEEP
12288:FmoPJ08hnCOV15iMd8TlJBh5nObxMzkFcSj+5zzWqxZhxKDPNNKI5WbjWbUtRWbd:V0pMdCMMzkuSYzxwDPNNKhtiC2n
Malware Config
Signatures
Files
-
SecuriteInfo.com.Adware.Downware.10736.30792.32130.exe.exe windows:5 windows x86 arch:x86
20c1a6d1d95f419f5469f4fc423382ac
Code Sign
da:59:74:b6:c2:9c:c6:62:43:f2:0e:96:17:51:84:60:58:93:5f:54Signer
Actual PE Digestda:59:74:b6:c2:9c:c6:62:43:f2:0e:96:17:51:84:60:58:93:5f:54Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
DeleteFileW
WaitForSingleObject
GetNativeSystemInfo
LoadLibraryExW
SetEvent
CreateEventW
GetSystemInfo
GetCommandLineW
SetEndOfFile
WriteConsoleW
SetStdHandle
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
SetFileTime
GetFileAttributesW
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
HeapCreate
LCMapStringW
GetCPInfo
GetStartupInfoW
HeapSetInformation
ExitProcess
RtlUnwind
DecodePointer
EncodePointer
InitializeCriticalSection
Sleep
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetCurrentDirectoryW
CreateDirectoryW
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CreateFileW
SetFilePointer
GetVersionExW
FreeResource
LoadLibraryW
GetProcAddress
FreeLibrary
GlobalFree
GetTickCount
lstrcmpiW
CreateFileA
WriteFile
CloseHandle
GetModuleHandleW
GlobalAlloc
GlobalLock
GlobalUnlock
SetLastError
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
MulDiv
lstrcmpW
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
lstrlenW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
EnterCriticalSection
RaiseException
MultiByteToWideChar
TlsFree
user32
SetForegroundWindow
OffsetRect
GetDoubleClickTime
ClipCursor
GetSystemMetrics
CallWindowProcW
SetWindowLongW
GetWindowLongW
SendMessageW
DefWindowProcW
GetSysColor
MoveWindow
SetWindowPos
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
TranslateMessage
GetMessageW
wsprintfW
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
LoadImageW
DispatchMessageW
GetWindowRect
PostQuitMessage
CharNextW
UpdateLayeredWindow
SetCursor
KillTimer
IsZoomed
MessageBoxW
IsChild
GetParent
GetDlgItem
GetClassNameW
ReleaseCapture
FillRect
DestroyWindow
EndPaint
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
GetWindow
GetFocus
SetFocus
IsWindow
GetClassInfoExW
LoadCursorW
RegisterClassExW
UnregisterClassA
CreateWindowExW
CreateAcceleratorTableW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
RegisterWindowMessageW
PtInRect
SetRectEmpty
IsRectEmpty
GetCursorPos
PostMessageW
EnableWindow
CopyRect
IntersectRect
ShowWindow
IsWindowVisible
SetTimer
PeekMessageW
gdi32
DeleteObject
CreateFontW
SelectClipRgn
GetViewportOrgEx
ExtSelectClipRgn
PatBlt
CreateRectRgnIndirect
CreateRectRgn
SetStretchBltMode
CreateDCW
SelectObject
GetClipRgn
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
CreateSolidBrush
GetObjectW
GetStockObject
ExtTextOutW
SetTextColor
SetBkColor
SetViewportOrgEx
GetObjectA
advapi32
RegDeleteKeyW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegCreateKeyExW
shell32
CommandLineToArgvW
ShellExecuteA
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoUninitialize
RegisterDragDrop
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
DispCallFunc
VariantInit
SysAllocStringLen
VariantClear
SysStringLen
shlwapi
StrCpyW
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsW
SHSetValueW
comctl32
_TrackMouseEvent
InitCommonControlsEx
msimg32
AlphaBlend
urlmon
URLDownloadToFileA
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromScan0
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawString
GdipSetStringFormatTrimming
GdipSetStringFormatHotkeyPrefix
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCreateSolidFill
GdipDeleteFont
GdipCreateStringFormat
GdipDeleteBrush
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipDisposeImage
GdipFree
GdipAlloc
GdipCreateFromHDC
GdipDeleteGraphics
GdipDeleteStringFormat
winmm
timeKillEvent
timeEndPeriod
timeSetEvent
timeBeginPeriod
wininet
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
InternetQueryDataAvailable
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 310KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 279KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ