Static task
static1
Behavioral task
behavioral1
Sample
896eb5f146817aae8981c31063029531caba959437ff610a7e096436f97300fe.dll
Resource
win10v2004-20230703-en
General
-
Target
VirusShare_393e2e61ff08a8f7439e3d2cfcb8056f.zip
-
Size
150KB
-
MD5
72de003a355077d4b27a080fa96dc779
-
SHA1
62568ee75cc9aeb99f7edbf838a4ae5ca972f940
-
SHA256
294477d53085c15c9dcef31b371228203bc79a732b7685e075878ed5c9e1d4bc
-
SHA512
5a6dd21f1b3bcdf8a77c34bce3064a98ed1bb24a11e4a8ccce9ee4d2068805a6c4a0f485d653f07ec1a6dacf0cff3d68cfc0ef247c746c2a9250f7b5055608ed
-
SSDEEP
3072:nHzm5H5f5F9+WA85ExflYHGRguz5g4rUNaWXwnHx6D1Gk06zhcaF/O45Ku0SS:HzmrUWAkEx/+CUNadR6D1Gkb1c2G4cuY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/896eb5f146817aae8981c31063029531caba959437ff610a7e096436f97300fe
Files
-
VirusShare_393e2e61ff08a8f7439e3d2cfcb8056f.zip.zip
Password: infected
-
896eb5f146817aae8981c31063029531caba959437ff610a7e096436f97300fe.dll windows x86
ec56314c9096ce285ee900e84107ef39
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
GetProcAddress
GetVersion
GetVersionExA
MulDiv
GetSystemTimeAsFileTime
VirtualAlloc
VirtualProtect
VirtualQuery
IsBadStringPtrA
Sleep
QueryPerformanceFrequency
IsDebuggerPresent
GetComputerNameA
GetLastError
IsBadCodePtr
IsBadReadPtr
GetUserDefaultLCID
GetProcessHeap
user32
GetMenuContextHelpId
GetWindowContextHelpId
GetWindowTextLengthA
IsCharAlphaNumericA
IsCharAlphaA
GetWindowDC
IsClipboardFormatAvailable
CopyIcon
GetAncestor
GetLastActivePopup
GetWindowThreadProcessId
IsIconic
IsWindowVisible
GetWindowPlacement
IsChild
GetCursor
advapi32
AreAnyAccessesGranted
InitializeSecurityDescriptor
IsValidSecurityDescriptor
GetUserNameA
msvcrt
malloc
_initterm
free
_swab
_ultoa
_CIsinh
srand
ldiv
_adjust_fdiv
time
modf
ceil
_pctype
_isctype
localeconv
__mb_cur_max
__doserrno
div
_CIacos
rand
gdi32
GetPixel
GdiGetBatchLimit
GetBkMode
GdiFlush
ole32
CoDosDateTimeToFileTime
shell32
DuplicateIcon
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ