Behavioral task
behavioral1
Sample
VirusShare-017fe80c75a76181bc9fa2c961378627.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-017fe80c75a76181bc9fa2c961378627.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare-017fe80c75a76181bc9fa2c961378627
-
Size
451KB
-
MD5
017fe80c75a76181bc9fa2c961378627
-
SHA1
ac9f72f2ed883dd42cbe88dfc06099f83d714e60
-
SHA256
7366770b17f0e11fa915af3c7130cbd3fc3d500c3dff6b9f711ddb3602ff1c93
-
SHA512
e7b38292bed6450df5fac4acd7e452a081457b675a14368b7e299cc2e915274e0cb7d0ba68f350da7fbf3e900544f4b357ddc0e0b00991a62885984c22b3d7a7
-
SSDEEP
6144:zYtfZOFChiGWq2Aw872g38H99uIoCvua5CBzyfS6:zoOwhiG12T872g38ikXB
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-017fe80c75a76181bc9fa2c961378627
Files
-
VirusShare-017fe80c75a76181bc9fa2c961378627.exe windows:4 windows x86 arch:x86
8ebd3d4fcddefd81418ab8c35e249fc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
Sleep
CreateThread
GetModuleFileNameA
lstrcmpiA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
GetModuleHandleA
CloseHandle
WriteFile
CreateFileA
MoveFileA
CreateProcessA
GetTempPathA
DeleteFileA
GetSystemDirectoryA
ExitProcess
ReadFile
SetFilePointer
GetFileSize
MultiByteToWideChar
TransactNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
FindClose
FindNextFileA
FindFirstFileA
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesA
GetTimeFormatA
GetDateFormatA
FormatMessageA
LoadLibraryExA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetComputerNameA
CopyFileA
WideCharToMultiByte
TerminateProcess
GetCurrentProcess
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
SetConsoleCtrlHandler
GetLocaleInfoA
GetVersionExA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
GetLogicalDrives
WaitForMultipleObjects
TerminateThread
GenerateConsoleCtrlEvent
GlobalMemoryStatus
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
GetCPInfo
GetACP
GetOEMCP
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
SetEndOfFile
Sections
UPX0 Size: 448KB - Virtual size: 448KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE