Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-68b93b8223e12cf1a6d016c514b88cda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-68b93b8223e12cf1a6d016c514b88cda.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-68b93b8223e12cf1a6d016c514b88cda
-
Size
29KB
-
MD5
68b93b8223e12cf1a6d016c514b88cda
-
SHA1
4f65e127ccb00a3e533c5d21a3ff288ac56f9f39
-
SHA256
3a722c8084a798ad0ab6c4f2be228faa541a64b4ab3c0a6b9acdaeb08da4f2c1
-
SHA512
aceaf128336a17f1a7e605a26e5fd36b956c897380a7f46819c6053272a60a3079f085c5f7b19a9fe1ada9aafe8c08e01cdd9cf7b7ccdd3ebd2312bbd50d4c7c
-
SSDEEP
384:4JueJfyGxT8CrD+4R0vl40j5wMzs1yXlUI1fDcyozukPdRhzm:4tyCH+207j5wOEyXlUMfDcbqUl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-68b93b8223e12cf1a6d016c514b88cda
Files
-
VirusShare-68b93b8223e12cf1a6d016c514b88cda.exe .hta .vbs windows:4 windows x86 arch:x86 polyglot
efa82646aae6b0633e64b3f63daa7648
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
GetModuleFileNameA
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
GetLocalTime
ReleaseMutex
SetEndOfFile
SetFileAttributesA
SetFilePointer
Sleep
SystemTimeToFileTime
TerminateProcess
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetFileSize
GetDateFormatA
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
FindNextFileA
FindFirstFileA
FindClose
ExitThread
ExitProcess
CreateToolhelp32Snapshot
CreateThread
CreateMutexA
CreateFileMappingA
CreateFileA
CopyFileA
CompareFileTime
ReadFile
CloseHandle
user32
DrawTextA
CharUpperA
wsprintfA
MessageBoxA
GetDesktopWindow
wsock32
recv
gethostbyname
connect
closesocket
listen
accept
WSAStartup
select
send
bind
gethostname
inet_addr
socket
ole32
CoInitialize
CreateStreamOnHGlobal
shlwapi
StrRChrA
StrStrIA
StrTrimA
StrDupA
StrChrIA
wininet
InternetGetConnectedState
advapi32
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
urlmon
URLDownloadToFileA
shell32
ShellExecuteA
gdi32
CreateBitmap
CreateCompatibleDC
CreateFontA
DeleteDC
DeleteObject
FloodFill
GetDIBits
GetDeviceCaps
GetObjectA
SelectObject
SetBkMode
SetTextColor
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE