Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_368c01b181eda42d717feeff4291bb4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_368c01b181eda42d717feeff4291bb4a.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_368c01b181eda42d717feeff4291bb4a
-
Size
45KB
-
MD5
368c01b181eda42d717feeff4291bb4a
-
SHA1
d6a6df6a094b9d76a16c1c9d5ce16b9124ee50b1
-
SHA256
1a123a6b7cd4740e829d2e5178c718549d7d17bc7bb348e60fa7be6e1c683d72
-
SHA512
8c45f2bd544224de18c46e3ff90b6f75eca41d66be1636a3845e259df9618c33bab2120ee6f866edc4a490039729920c9708e5f600594e1b3a1ebacb17b904d3
-
SSDEEP
768:it4VZ1p/ija+1ImUqJsbEYY2Ixs4RhYuX5tOH2AFOmDDRLoJQ7zqAU6FbMPwl:Y4VZPqibA26sMK2GncKmA5
Malware Config
Signatures
-
Detects ransomware indicator 1 IoCs
resource yara_rule sample SUSP_RANSOMWARE_Indicator_Jul20 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_368c01b181eda42d717feeff4291bb4a
Files
-
VirusShare_368c01b181eda42d717feeff4291bb4a.exe windows:4 windows x86 arch:x86
7b62401438b22d589a3be8c7f3471563
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
GetKeyboardType
DestroyWindow
MessageBoxA
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
SizeofResource
SetFileAttributesA
LockResource
LoadResource
GetWindowsDirectoryA
GetTempPathA
GetSystemDirectoryA
GetModuleFileNameA
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
shfolder
SHGetFolderPathA
shell32
ShellExecuteA
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ