Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exe
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exe
-
Size
381KB
-
MD5
7c0a5c2cde620549b93d8372960b63c1
-
SHA1
e7e684fc020fb92016986ecdbca17123dfa54fd8
-
SHA256
3271f49b0f0a89a484b670cf79cd73f57c28cae28a5a3e0c1c6c281c9aaadd71
-
SHA512
cedfc286419566b4fba5fc92fbff32609fb41e5859edd1e826f70a4256d743ce809cf304cf0d0f20142c11ec40dd9b7f55030c9a7efbfc988fe4de93c0e0b515
-
SSDEEP
6144:YePdowp/FFsk4ff2wZ5Yd3CTqhs1T5CJGi6Axj6KAI281:NowVLX4ff2wsd3BO1TM36AxHAF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exe
Files
-
SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exe.exe windows:6 windows x64 arch:x64
a87033b91daba663ce76e728a71c03f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
LocalFree
FormatMessageW
lstrlenW
GetComputerNameA
VerifyVersionInfoW
SetEndOfFile
WriteConsoleW
VirtualProtect
CreateFileW
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
CreateProcessA
Sleep
GetEnvironmentVariableW
HeapSize
VerSetConditionMask
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
CloseHandle
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
RtlUnwind
user32
DispatchMessageW
TranslateMessage
ShowWindow
SendMessageW
LoadIconW
MessageBoxW
GetClientRect
UpdateWindow
GetMessageW
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
gdi32
SetBkColor
CreateSolidBrush
CreateFontW
SetTextColor
shell32
ShellExecuteW
SHGetFolderPathW
SHGetFolderPathA
ole32
CoInitialize
CoUninitialize
shlwapi
PathFileExistsW
PathCombineW
PathAppendW
StrCmpW
StrCatW
StrStrW
PathIsDirectoryW
PathRemoveFileSpecW
PathFindFileNameW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetGetUniversalNameW
WNetGetResourceInformationW
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
WNetGetConnectionW
WNetAddConnection2W
urlmon
URLDownloadToFileW
Sections
.text Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ