hh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-00442af510eaeda2d648e5a0bf7ea460.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-00442af510eaeda2d648e5a0bf7ea460.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-00442af510eaeda2d648e5a0bf7ea460
-
Size
62KB
-
MD5
00442af510eaeda2d648e5a0bf7ea460
-
SHA1
9e72a7d5086ee07d93273d346f30cfe9f74f8d72
-
SHA256
c400694058e37ebf5d5bc64dd4169d0371bb2f1b3a7c75f7e41168a5c895cbef
-
SHA512
342973bfdc31a796ebebb6b5057087da27bd9660447a0c26a63ceda1c5a318996c0efcecf7ee3b044259fa88fa00c11622bd06a4c3e0ff4c00026ba0583bfef1
-
SSDEEP
768:jqJtHlFC/BcY08t+iCHW0thEJ49SoZj34CFC7hbTdVMtsIJeecX55vo:mDCV0m+iqEi8oZjIBVdVcsgrcX55vo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-00442af510eaeda2d648e5a0bf7ea460
Files
-
VirusShare-00442af510eaeda2d648e5a0bf7ea460.exe windows:5 windows x86 arch:x86
9ed54609127a70e312733e0fe986dabe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
GetTickCount
QueryPerformanceCounter
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcpyA
GetCurrentThreadId
user32
wsprintfA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE