Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_fecfdfbf2d449941e270f12485566590.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_fecfdfbf2d449941e270f12485566590.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_fecfdfbf2d449941e270f12485566590
-
Size
153KB
-
MD5
fecfdfbf2d449941e270f12485566590
-
SHA1
c85406e6e00e79e058a63f9a3d2b7d13503b75d8
-
SHA256
7f64037899267d77809b23037b538069f7e67d8ba97637213616c20a08a531a4
-
SHA512
f90e024f3bedc66e67b72d5059a28be3fbed8adb321c2bf57de590fc5e653b52a16e894cf6b76b246a2da796d8edf709c1f1d39adc7686e9b2fd51b1ab297d47
-
SSDEEP
1536:F+Cda5S1+aacNgq/raw7f5TAe1XmVJvs+bSOHIj87ASO6r5bf4gKAcAYaVuess:Jf1lvhF12V1HIGO6r5bggMAY0ss
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_fecfdfbf2d449941e270f12485566590
Files
-
VirusShare_fecfdfbf2d449941e270f12485566590.exe windows:5 windows x86 arch:x86
83cf1abf5851657fa5754eaafc0c6550
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
LocalAlloc
LocalFree
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
SetCurrentDirectoryW
SetErrorMode
SetFileAttributesW
LoadLibraryA
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
VirtualAllocEx
ReadFile
CreateFileA
InterlockedIncrement
InterlockedDecrement
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateProcessW
CreateFileW
CreateFileMappingW
SetLastError
CloseHandle
user32
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
wsprintfW
LoadIconA
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetParent
GetMessageW
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoW
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
DrawTextW
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CheckRadioButton
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
GetNextDlgTabItem
gdi32
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
GetTextMetricsW
GetStockObject
GetObjectW
GetMapMode
GetDeviceCaps
DeleteObject
DeleteDC
BitBlt
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
DPtoLP
advapi32
AdjustTokenPrivileges
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
msvcrt
_wsplitpath
swscanf
setlocale
memmove
_except_handler3
_vsnwprintf
_wmakepath
_wtoi
free
malloc
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 380B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ