Behavioral task
behavioral1
Sample
VirusShare-fe63121e5f4f5839356a1b98939c781e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-fe63121e5f4f5839356a1b98939c781e.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare-fe63121e5f4f5839356a1b98939c781e
-
Size
736KB
-
MD5
fe63121e5f4f5839356a1b98939c781e
-
SHA1
4e39f5aa7be22f3e4e62ee5794cf23f7ff0afc8b
-
SHA256
c942c5a3a0a2d972d86933f27723d9412167b646a08b3d85e613089e376142f0
-
SHA512
89fe83ca04a8bcd124c108401d8689d4a2ffdb2939274799b4860be45f7100843b9c97a3ae32d725dad1e228f9d92ef3dc293d46e6019cdde0ae5761e4e5c79f
-
SSDEEP
12288:8nekxoehiwtNAunhTp1ppz1l4IWu+YCtScouzwZ9ddjROz5XUmYl8pq7boTZzuC+:5soehTNAuj1ppz1l4IWu+YCtS7uzwZ9P
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-fe63121e5f4f5839356a1b98939c781e
Files
-
VirusShare-fe63121e5f4f5839356a1b98939c781e.exe windows:4 windows x86 arch:x86
a2f0bdc1e369cb282ecb6dc7e832f27a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapSize
LocalFree
lstrlenA
FreeLibrary
IsProcessorFeaturePresent
InterlockedDecrement
Sleep
WideCharToMultiByte
QueryPerformanceFrequency
QueryPerformanceCounter
lstrlenW
MulDiv
UnmapViewOfFile
GetVersionExA
CreateFileW
CreateFileMappingA
MapViewOfFile
GetFileSize
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
GetLastError
CloseHandle
GetProcAddress
HeapAlloc
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
CreateFileA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
user32
GetCursorPos
GetDesktopWindow
GetClientRect
GetForegroundWindow
LoadCursorA
RegisterClassExA
DrawTextA
DrawTextW
CreateWindowExA
ShowWindow
UpdateWindow
ShowCursor
PeekMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
GetDC
ReleaseDC
LoadIconA
gdi32
GetDeviceCaps
CreateFontIndirectA
DeleteObject
DeleteDC
SelectObject
SetTextColor
SetBkColor
SetBkMode
CreateDIBSection
GetObjectA
CreateCompatibleDC
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
winmm
timeEndPeriod
timeGetTime
timeBeginPeriod
d3d8
Direct3DCreate8
Sections
.text Size: 524KB - Virtual size: 520KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 148KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE