Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_757cfaff920f7f699324f653372b4f4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_757cfaff920f7f699324f653372b4f4b.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_757cfaff920f7f699324f653372b4f4b
-
Size
395KB
-
MD5
757cfaff920f7f699324f653372b4f4b
-
SHA1
2fdcf52e738554e76d0d88cc87c0c62b81adb727
-
SHA256
f773dc4bcd7e6e7d3d044d505cb6c169ce8857ab3d622aadb06e438c58b80c81
-
SHA512
213ba9d34ee8e7f4b44756e50a737b5de30698cb2397b348ccfc7150173f809e362f3b2ae1ecab0712b5daa0249717ca85d1dfa25dd7b678884670c276ff8d19
-
SSDEEP
6144:C2TiYwZTRYjAKRahwNRvz9gKqLC7/2FFhsnftZZWnxw+FlH6dpX:XmjHYjRMSxR7+7hsnftfsblHGZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_757cfaff920f7f699324f653372b4f4b
Files
-
VirusShare_757cfaff920f7f699324f653372b4f4b.exe windows:5 windows x86 arch:x86
0d4d44c7cbccf3f064cf1fd8ea3d09bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
InvalidateRect
GetWindowDC
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreatePopupMenu
EnableWindow
EndPaint
FillRect
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
DialogBoxParamA
GetDlgItemTextA
GetKeyState
SetWindowRgn
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
LoadBitmapA
LoadIconA
DefWindowProcA
GetDlgItem
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenuItemBitmaps
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
GetSysColor
GetWindowThreadProcessId
CopyRect
OffsetRect
GetParent
DrawIcon
IsIconic
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
BeginPaint
AppendMenuA
wsprintfA
SetRect
UnregisterClassA
GetTopWindow
SetCursor
GetMessageA
TranslateMessage
ValidateRect
WindowFromPoint
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
SystemParametersInfoA
GetWindow
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
ExitWindowsEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
shell32
ShellExecuteA
SHChangeNotify
advapi32
CreateServiceA
OpenProcessToken
StartServiceA
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
DeleteService
GetTokenInformation
LookupPrivilegeValueA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyA
RegFlushKey
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
wininet
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetOpenW
gdi32
CreateFontIndirectA
GetStockObject
GetDeviceCaps
SaveDC
RestoreDC
CreateRectRgn
GetClipBox
GetDIBits
GetObjectA
PtVisible
RectVisible
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
TextOutA
SwapBuffers
SetTextColor
SetPixelFormat
SetBkMode
SetBkColor
SelectObject
Polygon
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
ChoosePixelFormat
BitBlt
CombineRgn
StretchBlt
SetMapMode
GetBkColor
comctl32
ord17
ImageList_LoadImageA
netapi32
NetUserAdd
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
GetJobW
kernel32
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
Sleep
GetCommandLineA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetLastError
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleHandleA
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
RaiseException
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
GetStartupInfoA
Sections
.tls Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ndata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ