Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-018794d22c15f58811c8333a6c45bbae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-018794d22c15f58811c8333a6c45bbae.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-018794d22c15f58811c8333a6c45bbae
-
Size
56KB
-
MD5
018794d22c15f58811c8333a6c45bbae
-
SHA1
6de26c388c8ed37499fc8315ecc8332bae8038bf
-
SHA256
d19affc2a2e7949f0da7a5564395a3d173596e27f3e902a9a31e30e4ca37453f
-
SHA512
4c9aa460d465c9bf255da4ee93d2a2b97c5221498987bb130889c32536420ecb71b7daa8b2bff160a6877ae06d7289812d84f7eb7be7b343c1dc5cc823729000
-
SSDEEP
768:qxUjd/BHUKhCYFuUtThRECAynOQINIgPQ2o/KNzBDYyxOIG4:qSjtFUKhCktICAynOTIuPWaxOIG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-018794d22c15f58811c8333a6c45bbae
Files
-
VirusShare-018794d22c15f58811c8333a6c45bbae.exe windows:4 windows x86 arch:x86
17ac1c8a533312daecee1a18a5ec137a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapFree
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
SetLastError
UnmapViewOfFile
SetFileTime
GetFileSize
GetFileTime
CloseHandle
CreateFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
SetFilePointer
HeapDestroy
SetErrorMode
LoadLibraryA
GetModuleFileNameA
GetProcAddress
DeleteFileA
GetLastError
ExitThread
GetProcessHeap
EnumDateFormatsExA
ReplaceFileW
Sections
.code_01 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ