g:\xxah\kllsejvo\krdsqsiba.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-3f066dd1f1da052248aed5abc4a0c6a1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare-3f066dd1f1da052248aed5abc4a0c6a1.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare-3f066dd1f1da052248aed5abc4a0c6a1
-
Size
728KB
-
MD5
3f066dd1f1da052248aed5abc4a0c6a1
-
SHA1
719e9bad047b7bf2a3aa5d898a26045d489e7616
-
SHA256
15c0f4e0bb74893b20326f871aa29ac9bf7f79ca437416e2d45f679722517d8d
-
SHA512
8ec5a2df8ca0bada3b0e2d797d69b346c68c5ce33a907fee5006747378027f21c5180260e922014d4e868a6ccb8f79d9b6208ef99c5d8547a427738617eedc85
-
SSDEEP
12288:QOjl/qHa9L9+Dv6ZJ3dp8VDqK/vv5KR6jAu0p3c1ytghDydhzPc0i+9hqHbc8YbR:rl/qHa7j2m+8Rbu4MAtgGw0ighEb9YN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-3f066dd1f1da052248aed5abc4a0c6a1
Files
-
VirusShare-3f066dd1f1da052248aed5abc4a0c6a1.exe windows:4 windows x86 arch:x86
2276e081eebeb1248a24b089db23c75a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetClipBox
MoveToEx
PtVisible
GetTextColor
PatBlt
RoundRect
GetSystemPaletteEntries
ExtFloodFill
LPtoDP
DeleteDC
SelectClipRgn
SetWindowOrgEx
CreateRectRgnIndirect
Ellipse
SetWindowExtEx
GetRegionData
SetPolyFillMode
SetViewportOrgEx
GetDCOrgEx
GetDeviceCaps
UnrealizeObject
CreateFontIndirectA
GetPixel
GetCurrentPositionEx
TextOutA
CreateRectRgn
SetPaletteEntries
GetPaletteEntries
SetTextAlign
SetBkColor
EnumFontFamiliesExA
mpr
WNetEnumResourceA
WNetCloseEnum
WNetOpenEnumA
advapi32
RegCloseKey
RegEnumKeyA
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
OpenProcessToken
RegEnumValueA
shell32
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
kernel32
IsBadReadPtr
GlobalUnlock
LCMapStringA
GetEnvironmentStringsW
GetOEMCP
GetCurrentThreadId
GetWindowsDirectoryW
Sleep
GetFileSize
MoveFileW
SetEndOfFile
VirtualFree
TerminateProcess
GetSystemInfo
SetHandleCount
HeapReAlloc
ResumeThread
GetProcAddress
WideCharToMultiByte
OpenProcess
FreeEnvironmentStringsW
GetVersionExA
GetDriveTypeA
MultiByteToWideChar
InitializeCriticalSection
lstrlenW
lstrcpyW
LoadLibraryA
CompareStringA
FreeEnvironmentStringsA
GetCurrentDirectoryA
SetFileAttributesW
SizeofResource
GetModuleFileNameW
TlsSetValue
GlobalHandle
FreeLibrary
TlsFree
GetCurrentProcess
WaitForSingleObject
SetCurrentDirectoryA
GetModuleFileNameA
CreateDirectoryA
TerminateThread
GetModuleHandleW
CreateFileW
LockFile
VirtualAlloc
GlobalFree
HeapFree
GlobalDeleteAtom
UnhandledExceptionFilter
FindFirstFileW
SetStdHandle
GetCPInfo
GetStringTypeA
WriteFile
CreateMutexW
SetThreadPriority
GetThreadLocale
IsBadWritePtr
CreateThread
ExitProcess
GlobalAlloc
GetFullPathNameW
RtlUnwind
RemoveDirectoryW
FileTimeToLocalFileTime
UnmapViewOfFile
LeaveCriticalSection
FindFirstFileA
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
MulDiv
GetUserDefaultLangID
FileTimeToSystemTime
GetCurrentProcessId
SetFilePointer
CreateDirectoryW
GetCommandLineA
IsBadCodePtr
GetTempPathA
GetStartupInfoA
GetProcessHeap
GetTimeZoneInformation
CreateFileA
QueryPerformanceCounter
FormatMessageW
LocalReAlloc
HeapAlloc
GetCommandLineW
lstrcmpW
GetSystemTimeAsFileTime
LCMapStringW
GetTempPathW
FindNextFileW
LoadLibraryW
ExpandEnvironmentStringsW
GetStdHandle
WaitForMultipleObjects
GlobalSize
InterlockedExchange
ExpandEnvironmentStringsA
InterlockedDecrement
FlushFileBuffers
UnlockFile
ReadFile
GetLastError
SetEnvironmentVariableA
GetStartupInfoW
lstrlenA
GetModuleHandleA
DeleteCriticalSection
LoadResource
GetEnvironmentStrings
GetDateFormatA
EnterCriticalSection
DuplicateHandle
FindNextFileA
CompareStringW
GetStringTypeW
GlobalLock
HeapCreate
GetCurrentThread
RaiseException
VirtualProtect
FindClose
CloseHandle
CreateFileMappingW
LocalAlloc
GetFileType
SetLastError
TlsGetValue
CreateProcessW
GetTickCount
HeapDestroy
GetLocalTime
SetEnvironmentVariableW
GlobalReAlloc
ReleaseMutex
CopyFileA
CreateToolhelp32Snapshot
GetVersion
GetACP
InterlockedIncrement
VirtualQuery
DeleteFileA
lstrcpyA
GetTimeFormatA
TlsAlloc
LocalFree
SetEvent
GetFileAttributesW
SetUnhandledExceptionFilter
comctl32
ImageList_GetImageCount
ImageList_GetIcon
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_Destroy
ord17
InitCommonControlsEx
CreatePropertySheetPageW
DestroyPropertySheetPage
ImageList_GetImageInfo
PropertySheetW
ImageList_Draw
ImageList_Create
ImageList_AddMasked
ole32
OleRegEnumVerbs
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
OleRegGetMiscStatus
IsAccelerator
OleTranslateAccelerator
user32
MoveWindow
TranslateMessage
DestroyAcceleratorTable
SendDlgItemMessageW
TranslateMDISysAccel
GetMenuItemID
LoadMenuW
TranslateAcceleratorW
EnableWindow
RegisterClassW
PostQuitMessage
SetWindowsHookExW
DispatchMessageW
LockWindowUpdate
DestroyMenu
SetWindowLongW
DestroyCursor
SetCapture
EndDeferWindowPos
UnpackDDElParam
SystemParametersInfoW
PeekMessageW
DestroyCaret
GetKeyState
GetCapture
InvalidateRect
GetMenuItemInfoW
GetDC
GetWindowThreadProcessId
InflateRect
GetMenuDefaultItem
ReuseDDElParam
GetMenuState
WindowFromPoint
GetDesktopWindow
SetWindowPlacement
DrawMenuBar
GetClientRect
GetWindowPlacement
IsWindowEnabled
SetMenuItemBitmaps
GetWindowRgn
CharUpperW
AppendMenuW
SendDlgItemMessageA
GetClassNameW
SetRect
GetMenuCheckMarkDimensions
UnionRect
IsChild
DefWindowProcW
ClientToScreen
GetDlgItem
GetSystemMetrics
GetMenu
SetMenu
LoadBitmapW
InvalidateRgn
ShowWindow
DeferWindowPos
GetMessageTime
GetKeyboardLayout
GetDCEx
CreatePopupMenu
FindWindowW
GetMessageW
CreateMenu
LoadImageW
IsZoomed
GetScrollPos
SetWindowTextW
BeginDeferWindowPos
IntersectRect
SetTimer
GetMessagePos
DrawFocusRect
GetWindowTextW
SetParent
IsWindow
GetMenuStringW
BringWindowToTop
SendMessageW
BeginPaint
RedrawWindow
GetWindowTextLengthW
DrawEdge
SetActiveWindow
GetDlgCtrlID
EmptyClipboard
DeleteMenu
DrawStateW
RegisterClipboardFormatW
ReleaseCapture
GetCursorPos
ShowOwnedPopups
CreateDialogIndirectParamW
GetNextDlgGroupItem
AttachThreadInput
EnumChildWindows
GetFocus
SetMenuDefaultItem
ReleaseDC
GetUpdateRect
RegisterClassExW
CheckMenuItem
InsertMenuItemW
EqualRect
CopyIcon
IsDialogMessageW
CallNextHookEx
DrawFrameControl
GetWindow
GetClassInfoExW
TrackPopupMenuEx
UpdateWindow
DrawIcon
RegisterWindowMessageW
AdjustWindowRectEx
OpenClipboard
GetForegroundWindow
GetTopWindow
DestroyWindow
MessageBeep
FrameRect
TrackPopupMenu
SetCursorPos
MessageBoxW
MapWindowPoints
GetSystemMenu
GetWindowDC
CreateWindowExW
WaitMessage
IsClipboardFormatAvailable
SetDlgItemInt
GetSysColorBrush
GetAsyncKeyState
GetWindowRect
SetRectEmpty
EndDialog
GetLastActivePopup
SetCursor
DestroyIcon
IsDlgButtonChecked
LoadIconW
DrawIconEx
ScreenToClient
SystemParametersInfoA
KillTimer
FillRect
UnhookWindowsHookEx
IsRectEmpty
LoadCursorW
wsprintfA
GetActiveWindow
MapDialogRect
IsWindowVisible
GetWindowLongW
ScrollWindow
SetClipboardData
SetScrollPos
InsertMenuW
EnableMenuItem
OffsetRect
GetSysColor
GetScrollInfo
IsIconic
LoadAcceleratorsW
CheckDlgButton
SetScrollInfo
SetWindowRgn
PtInRect
DrawTextW
GetMenuItemCount
SetForegroundWindow
SetWindowPos
CloseClipboard
CopyRect
GetSubMenu
SetDlgItemTextW
GetParent
IsMenu
SetFocus
CopyImage
UnregisterClassW
EndPaint
SetMenuItemInfoW
oleaut32
LoadTypeLi
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 480KB - Virtual size: 478KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ