install0.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8a0691b2cdb5d5286ea5caf72227e8c0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_8a0691b2cdb5d5286ea5caf72227e8c0.dll
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_8a0691b2cdb5d5286ea5caf72227e8c0
-
Size
144KB
-
MD5
8a0691b2cdb5d5286ea5caf72227e8c0
-
SHA1
a1a5971ba23d0b929ff8ef8dbaa0f352895f3453
-
SHA256
7c4a35d4186bd5684b9bd3125c7ed4c1d33122377a780e461e1c6cb280982a7b
-
SHA512
3ff2ed33c74171fad0c4f7a1a31b58a8311842d21ec87e7fb95fb2d132ce8be0a9eea854fe0fec4d74eb254bb9c51a3b0e4f613549f806d3db33a1b863a0de2b
-
SSDEEP
1536:WKaCtHTdvVaBXuGoNRtp6Qox3h8FxySofxquFZDmETVXAuLIi6:WKFJvVMXMNRtcF3wvo4uHq+PUi6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_8a0691b2cdb5d5286ea5caf72227e8c0
Files
-
VirusShare_8a0691b2cdb5d5286ea5caf72227e8c0.dll windows:4 windows x86 arch:x86
54cb0797863b6b3e2f47255a3ee3f8f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntdll
strtol
kernel32
GetCurrentProcess
TlsGetValue
IsDebuggerPresent
SetComputerNameW
GlobalLock
WriteConsoleInputA
SetLocalTime
SetConsoleScreenBufferSize
GetProcessWorkingSetSize
InterlockedExchangeAdd
GetFileSize
FlushFileBuffers
WriteProfileSectionA
GetExitCodeProcess
MapUserPhysicalPages
EnumResourceNamesW
GetDiskFreeSpaceExA
LocalFree
GetNumberOfConsoleInputEvents
FoldStringW
IsDebuggerPresent
CreateDirectoryExA
CreateNamedPipeA
SetCommTimeouts
DeleteFileW
TlsFree
GetOverlappedResult
QueryInformationJobObject
LocalAlloc
msvcrt
free
malloc
user32
FindWindowW
setupapi
SetupQueueCopyIndirectW
SetupGetFieldCount
SetupDiGetHwProfileListExW
SetupDiGetHwProfileFriendlyNameExW
SetupDuplicateDiskSpaceListA
SetupFreeSourceListA
SetupQuerySpaceRequiredOnDriveW
SetupSetPlatformPathOverrideW
SetupCopyOEMInfA
SetupQueueRenameA
SetupDiDrawMiniIcon
SetupDiLoadClassIcon
SetupInstallFilesFromInfSectionA
SetupGetLineCountA
SetupQueueCopyW
SetupQueueCopyA
SetupInstallServicesFromInfSectionW
SetupDiOpenDeviceInterfaceW
SetupDiGetClassInstallParamsW
SetupDiInstallDriverFiles
SetupDiDestroyClassImageList
SetupQueueDefaultCopyA
SetupDiEnumDeviceInterfaces
SetupDiGetSelectedDevice
SetupCommitFileQueueA
SetupDeleteErrorW
SetupDiInstallClassExA
SetupDiGetDriverInstallParamsA
SetupDiCreateDeviceInfoW
SetupFindFirstLineA
SetupDiGetHwProfileListExA
SetupDiCreateDeviceInterfaceRegKeyA
SetupDiCreateDeviceInterfaceA
SetupCreateDiskSpaceListW
SetupDiGetClassImageListExW
SetupGetSourceFileLocationA
SetupDiEnumDeviceInfo
opengl32
glPixelZoom
glGetTexGendv
glNormal3b
wglGetLayerPaletteEntries
glIndexMask
glGetIntegerv
glClipPlane
glColor4sv
glCopyTexImage2D
glPopName
glDisable
glTexCoord1d
glIndexi
glGetMapiv
glIndexubv
mscms
TranslateColors
EnumColorProfilesA
GetCMMInfo
GetStandardColorSpaceProfileA
CreateProfileFromLogColorSpaceA
CreateDeviceLinkProfile
CheckColors
DeleteColorTransform
InstallColorProfileA
SelectCMM
SetColorProfileElement
SetStandardColorSpaceProfileW
CheckBitmapBits
UnregisterCMMA
Exports
Exports
CallPFXBlob
FindNearestQueueKeyMoniker
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_Interlo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.OC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ