Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_e5db950fee89e1f423f343f449457834.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_e5db950fee89e1f423f343f449457834.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_e5db950fee89e1f423f343f449457834
-
Size
272KB
-
MD5
e5db950fee89e1f423f343f449457834
-
SHA1
6516ac180e8c661499eea02f456558e12acc7108
-
SHA256
8ede1b80c18f65af0048bb0219e4d91c0fbabf8a66e555bc39020a44feea790e
-
SHA512
0c8a4f3cdbe21a91d68ef05483c705a2adb454cdcc65da30cee25409c34a25346d63db77fda6b63393da17e0259050bdc5cd71ae0ea004b052232280a5a473dd
-
SSDEEP
6144:6rH3RZ7tFAvi5FZ+kmEwfkrGMm/0VEr5YvoXN+8aDdySo:69dnFQnEAD/R2XpyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_e5db950fee89e1f423f343f449457834
Files
-
VirusShare_e5db950fee89e1f423f343f449457834.exe windows:5 windows x86 arch:x86
f61b93feb0c54e79c9647bd07b3e37a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateAcceleratorW
CreateCursor
DlgDirSelectComboBoxExA
GetClipCursor
DdeInitializeA
DdeGetLastError
SetCursorPos
GetWindowThreadProcessId
ExitWindowsEx
IsCharLowerW
DdeCreateStringHandleA
SetWindowTextA
IsWindowVisible
CheckRadioButton
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetMalloc
advapi32
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
gdi32
SetTextAlign
CreateBrushIndirect
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
kernel32
GetStringTypeA
GetConsoleMode
FlushFileBuffers
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
LCMapStringA
ReadFile
GetConsoleCP
SetEnvironmentVariableA
CreateFileA
Sleep
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
LockResource
PeekNamedPipe
BindIoCompletionCallback
MoveFileExA
GetModuleFileNameW
GetNamedPipeHandleStateA
MoveFileA
SetMailslotInfo
SetProcessShutdownParameters
GetLastError
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RaiseException
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
GetLocaleInfoA
Sections
.hrumer Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.upi Size: 147KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ