Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-c462067444740d52e2e1cfb5acf93996.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-c462067444740d52e2e1cfb5acf93996.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare-c462067444740d52e2e1cfb5acf93996
-
Size
537KB
-
MD5
c462067444740d52e2e1cfb5acf93996
-
SHA1
24645efb4f8de958480e8d6b38bfa1db1ca8b5c5
-
SHA256
478ab0006fea20c8c16c16c72e2b14a1628c11a1c0a105a6643697568b9e35e1
-
SHA512
5325eac2538182cb70f446c158dac31eeef6845edd4f8eb921163648403c984f14e34b45470c6449b90aede2fc4d2bc28b809ee8bf9d6a95cd578f15644bc305
-
SSDEEP
12288:6xdcuGDI5ciAwhQI43grTubrJ2eyXgHUCytMG/yXZxKVVlT5NOuMaa:9snhW3unw0OxXZxKVVlT5N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-c462067444740d52e2e1cfb5acf93996
Files
-
VirusShare-c462067444740d52e2e1cfb5acf93996.exe windows:4 windows x86 arch:x86
5284ee53a0796fc8a3f008193bc003c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
gethostname
ioctlsocket
htonl
gethostbyname
WSACleanup
WSAStartup
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
comctl32
_TrackMouseEvent
wininet
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
shlwapi
SHDeleteKeyA
kernel32
ResetEvent
CreateEventA
DeleteCriticalSection
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
HeapFree
GetProcessHeap
MulDiv
lstrlenW
WideCharToMultiByte
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
HeapAlloc
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
LeaveCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
LockResource
Sleep
DeleteFileA
GetTickCount
GetSystemTime
SystemTimeToFileTime
GetUserDefaultLCID
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
ReleaseMutex
MoveFileA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
GetSystemDirectoryA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
SetLastError
OpenMutexA
GlobalHandle
GetLocalTime
GetProcAddress
GetVersion
lstrcatA
GetComputerNameA
MoveFileExA
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
ResumeThread
GetPriorityClass
VirtualAlloc
VirtualFree
CreateRemoteThread
HeapSize
IsBadWritePtr
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetStartupInfoA
ExitProcess
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
GetSystemTimeAsFileTime
RtlUnwind
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
IsBadReadPtr
IsBadCodePtr
GetOEMCP
GetCPInfo
GetFileType
GetStringTypeA
GetStringTypeW
CloseHandle
CreateMutexA
lstrlenA
GetModuleFileNameA
lstrcmpA
GetCommandLineA
CreateProcessA
GetModuleHandleA
WriteProcessMemory
WaitForSingleObject
GetCurrentProcessId
SetEvent
LoadLibraryA
CreateThread
GetLastError
lstrcmpiA
GetShortPathNameA
lstrcpyA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CreateFileA
WriteFile
ReadFile
SetHandleCount
GetStdHandle
GetTimeZoneInformation
SetEndOfFile
CompareStringA
CompareStringW
GlobalFree
SetEnvironmentVariableA
user32
KillTimer
ShowWindow
PostQuitMessage
LoadImageA
EndDialog
DialogBoxParamA
CallWindowProcA
DestroyWindow
GetDlgItem
SendMessageA
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
CharNextA
GetParent
GetClassNameA
SetTimer
SetDlgItemTextA
GetWindowRect
SetWindowPos
RedrawWindow
IsWindow
GetClientRect
FindWindowA
EndPaint
GetDC
ReleaseDC
IsChild
SetFocus
PostMessageA
GetWindow
GetSysColor
DestroyAcceleratorTable
GetWindowTextLengthA
GetUpdateRgn
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
GetDlgItemTextA
DrawTextA
SetActiveWindow
EnableWindow
EnumChildWindows
SetPropA
ScreenToClient
GetPropA
GetWindowTextA
SetWindowTextA
GetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
UnregisterClassA
wsprintfA
CharLowerA
LoadCursorA
RegisterClassExA
CreateWindowExA
SetWindowLongA
CreateDialogParamA
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
DefWindowProcA
GetFocus
FindWindowExA
GetSystemMetrics
GetForegroundWindow
FillRect
BeginPaint
gdi32
CreateFontIndirectA
GetDIBits
SetBkMode
CreateRectRgn
FillRgn
SetStretchBltMode
SetDIBits
SetTextColor
StretchBlt
SetBkColor
GetStockObject
GetObjectA
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
GetDeviceCaps
BitBlt
DeleteDC
advapi32
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegQueryValueExA
GetUserNameA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegCreateKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueA
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CreateStreamOnHGlobal
CoInitialize
OleInitialize
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
OleUninitialize
oleaut32
OleCreateFontIndirect
SysAllocStringLen
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringByteLen
VariantClear
VariantInit
SysAllocString
Sections
.text Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 117KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE