Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_a24d2da438a14c301f65ee3044896cb0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_a24d2da438a14c301f65ee3044896cb0.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_a24d2da438a14c301f65ee3044896cb0
-
Size
336KB
-
MD5
a24d2da438a14c301f65ee3044896cb0
-
SHA1
b86dd7fa7824c4b1602a2b75b08091f97e494e7a
-
SHA256
70122d16e91b1cc4c82ca91940906b22447299deac60fcecac33548af1547315
-
SHA512
5f5c0274e636cfa4061d89a7ab872538623fd110c01b5ac8427e9decb36898a93f3cf4e8ce861a1012c923cb11094dead71454d0b5498a85231ca56552da1722
-
SSDEEP
6144:FdeNSWLBS2OtAO2bt1FDTacShcoj+mIpE+D7DfE2zRvq:4LBSbtaK23d7j9Ri
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_a24d2da438a14c301f65ee3044896cb0
Files
-
VirusShare_a24d2da438a14c301f65ee3044896cb0.exe windows:5 windows x86 arch:x86
5106d02943797272bb9485c6708eb8da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharToOemA
CharToOemBuffA
CharUpperA
CopyRect
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
FindWindowExA
GetClassNameA
GetClientRect
GetDlgItem
GetDlgItemTextA
GetMessageA
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
IsWindow
IsWindowVisible
IsCharAlphaA
GetMenu
GetAltTabInfoA
EnableMenuItem
CloseClipboard
GetParent
GetSystemMenu
CreateIconFromResource
HiliteMenuItem
GetKBCodePage
MapVirtualKeyA
gdi32
GetDeviceCaps
SelectClipRgn
CreatePolygonRgn
SetRectRgn
PaintRgn
GetGlyphOutlineA
GetTextColor
FillPath
SetMapperFlags
GetObjectW
PlgBlt
RectInRegion
UnrealizeObject
GetArcDirection
GetCharWidth32W
AbortDoc
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
RaiseException
MultiByteToWideChar
HeapSize
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
IsValidCodePage
ExitProcess
CancelDeviceWakeupRequest
GetHandleInformation
SetProcessWorkingSetSize
ReadFileScatter
LocalFree
FreeResource
FreeUserPhysicalPages
GetModuleFileNameW
GetTickCount
GetTempPathA
GetStdHandle
GetProcessHeap
GetProcAddress
GetNumberFormatA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileType
GetFileAttributesW
GetFileAttributesA
GetDateFormatA
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
DosDateTimeToFileTime
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateDirectoryW
HeapReAlloc
HeapAlloc
HeapFree
GetModuleHandleW
Sleep
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
Sections
.bss Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ