Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-78acafe43be4ecdbb04bf029d2617703.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare-78acafe43be4ecdbb04bf029d2617703.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-78acafe43be4ecdbb04bf029d2617703
-
Size
8KB
-
MD5
78acafe43be4ecdbb04bf029d2617703
-
SHA1
693bd2ba94c89cc6faadc6f0b8fad05679860efd
-
SHA256
cbe477458272076e5314be7d53859b584b89f775584ddf244edd02f0d224b1b9
-
SHA512
7fd3ebd7168f8d47029693fcdde1ab19a4623af0a9730b803cb036ac4b8e1418365c9671c0ecda514c8c3ad0d232b37f8aeb557e604f7c09a58278a68ca33012
-
SSDEEP
96:N9ygiHYyjYETmsExw0c7/N2naPtDCSETOApZffaojMd:g8x/c7/EaP9CSEqApZfS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare-78acafe43be4ecdbb04bf029d2617703
Files
-
VirusShare-78acafe43be4ecdbb04bf029d2617703.exe windows:4 windows x86 arch:x86
a6f6813ff36861172ef2fe6292fd5309
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GlobalAlloc
GlobalFree
ReadFile
SetFilePointer
WriteFile
lstrcpyA
GetModuleHandleA
CreateFileA
CloseHandle
user32
EnableWindow
GetDlgItem
DispatchMessageA
DestroyWindow
DefWindowProcA
PeekMessageA
LoadCursorA
LoadIconA
CreateWindowExA
PostQuitMessage
RegisterClassExA
ReleaseCapture
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
GetDlgItemTextA
GetMessageA
GetSystemMetrics
comdlg32
GetOpenFileNameA
gdi32
DeleteObject
CreateFontIndirectA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE