ConvertToDCFeX3
CreateFileSystemContainer
CreateIsoTrack
EnumVolumeRelease
MallocArray
MemcpyArrayToArray
RegisterFunction
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-00fb8b664881a1e2510bad292acf5dbe.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-00fb8b664881a1e2510bad292acf5dbe.dll
Resource
win10v2004-20231222-en
Target
VirusShare-00fb8b664881a1e2510bad292acf5dbe
Size
373KB
MD5
00fb8b664881a1e2510bad292acf5dbe
SHA1
7be9385babf40334f7d8261dccfa379485579ed0
SHA256
a248112e6cd7109203d670eb6071185fd6877dcfaef9cffe63fc337ba9488844
SHA512
98b9edad04ac23e1cf5d99710b5ce0610691be07ff4fc66e73dcdf03ba2e7e1012a86ae559651204101dc69e10bd8ae2bd7c119ba00e36498cf427a9bbd31ef3
SSDEEP
6144:UssmQFmttD0rCp/f7jDdbdvMh3aIicDrHIs4ya84c0whW:Uprm00Tnvyu84c7g
Checks for missing Authenticode signature.
resource |
---|
VirusShare-00fb8b664881a1e2510bad292acf5dbe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentDirectoryA
CloseHandle
GetCurrentProcess
SetFileTime
MoveFileA
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
CreateFileW
ReadFile
SetLastError
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetFullPathNameA
DeleteFileA
DeleteFileW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
GetLastError
FindFirstFileA
FindNextFileW
FindFirstFileW
GetVersionExA
GetModuleFileNameA
SetErrorMode
FreeLibrary
LoadLibraryA
LoadLibraryExA
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
FormatMessageA
LocalFree
SetConsoleCtrlHandler
Sleep
GetStdHandle
GetConsoleMode
SetConsoleMode
FindNextFileA
ReadConsoleA
GetStringTypeW
GetStringTypeA
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
GetVersion
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
CharLowerW
ExitWindowsEx
CharLowerA
LoadStringA
CharUpperA
CharToOemBuffA
CharToOemA
OemToCharA
OemToCharBuffA
CharUpperW
RegQueryValueExA
RegCloseKey
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ConvertToDCFeX3
CreateFileSystemContainer
CreateIsoTrack
EnumVolumeRelease
MallocArray
MemcpyArrayToArray
RegisterFunction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ