Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_3bfb4b2d36fa8a21714dbbf3bff45ec6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_3bfb4b2d36fa8a21714dbbf3bff45ec6.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_3bfb4b2d36fa8a21714dbbf3bff45ec6
-
Size
62KB
-
MD5
3bfb4b2d36fa8a21714dbbf3bff45ec6
-
SHA1
10e7495744e726af1410ab8f95b57288ca8f0b6e
-
SHA256
3bde5491cbd0128a65a88cab6cf1cb8e7435b4166eee2b977ed924b43963749e
-
SHA512
0fc9823f206079f436a41570af9958c5d2a890ba18d8b27fe5b270a22be0f11c948cc5080a97f8cf092cce7b8e7e4016864c65ce7622948f12a656e60a6e8646
-
SSDEEP
1536:pfGYHk5P8N1wF5KJWEEOjDBzY05B++SD/QysTdD:11E5P8AKJl9aw++SD/QycdD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_3bfb4b2d36fa8a21714dbbf3bff45ec6
Files
-
VirusShare_3bfb4b2d36fa8a21714dbbf3bff45ec6.exe windows:4 windows x86 arch:x86
af5ae68a7e377d76c282f89d1d4392af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
CreateJobObjectW
GlobalWire
SetTimerQueueTimer
FindFirstFileA
CreateRemoteThread
GetExitCodeThread
SwitchToThread
WriteProfileStringW
CloseHandle
GetVolumePathNameA
WriteConsoleOutputCharacterA
CreateProcessA
LocalSize
Module32NextW
TlsFree
GetCurrentConsoleFont
QueryPerformanceCounter
GetDefaultCommConfigW
WritePrivateProfileStructW
OpenFileMappingW
OpenJobObjectA
SearchPathW
GlobalFree
lstrcatA
Sleep
CreateMailslotA
GetQueuedCompletionStatus
GetOverlappedResult
_hread
GetDriveTypeW
GetUserDefaultUILanguage
GetDiskFreeSpaceA
RequestDeviceWakeup
EndUpdateResourceW
GetThreadSelectorEntry
LoadLibraryW
lstrcat
CreateDirectoryW
GetVersion
WriteConsoleOutputAttribute
CreateFileMappingA
DebugBreak
SetCommBreak
SetFileApisToOEM
GetProfileIntA
UnlockFileEx
GetThreadLocale
FreeEnvironmentStringsA
FillConsoleOutputAttribute
WriteConsoleA
SetInformationJobObject
GetNamedPipeHandleStateA
SetComputerNameExW
LeaveCriticalSection
FlushFileBuffers
OpenMutexW
CancelIo
CreateTapePartition
FindNextFileA
IsBadWritePtr
VirtualFree
EnumLanguageGroupLocalesW
CreateWaitableTimerA
EnumCalendarInfoW
GlobalAlloc
EnumTimeFormatsA
GetProcessShutdownParameters
FormatMessageA
EnumResourceTypesW
SetProcessAffinityMask
GetOEMCP
GetDiskFreeSpaceW
FreeUserPhysicalPages
FormatMessageW
EnumDateFormatsExW
GetPrivateProfileStringA
UnmapViewOfFile
SetErrorMode
VerifyVersionInfoW
GetConsoleAliasesLengthW
SetWaitableTimer
GetCurrentProcess
TerminateThread
GetProfileSectionW
GetModuleFileNameA
SetLocalTime
GetComputerNameExW
TlsAlloc
EscapeCommFunction
CallNamedPipeW
EnumResourceLanguagesW
DefineDosDeviceW
GetProfileSectionA
CancelWaitableTimer
GetModuleHandleW
CreateToolhelp32Snapshot
IsBadCodePtr
SetUnhandledExceptionFilter
MoveFileExW
CommConfigDialogA
lstrcmp
GetStringTypeW
FindNextChangeNotification
GetLocalTime
LocalAlloc
user32
GetDialogBaseUnits
FindWindowExW
OemToCharA
FreeDDElParam
PostMessageA
GetWindowPlacement
SendNotifyMessageA
InsertMenuItemW
DdeGetLastError
DdeAccessData
SetWindowsHookExW
CreateCaret
DdeReconnect
InflateRect
SetWindowContextHelpId
GetAltTabInfo
TrackPopupMenuEx
SetWindowsHookA
UnhookWindowsHookEx
FlashWindow
UnregisterClassW
SetUserObjectInformationW
GetClientRect
GetSystemMetrics
SetTimer
OpenWindowStationW
ChangeDisplaySettingsA
CloseDesktop
ExitWindowsEx
IsWindowUnicode
mouse_event
GetKeyboardLayout
GetClassInfoA
ModifyMenuA
GetShellWindow
TranslateAcceleratorW
DdeInitializeA
GetWindowWord
GetMessagePos
GetActiveWindow
SendMessageCallbackA
OemToCharW
OpenWindowStationA
GetMessageExtraInfo
CreateAcceleratorTableA
LockWindowUpdate
ToUnicodeEx
OffsetRect
PostThreadMessageA
SetProcessWindowStation
AnyPopup
IMPQueryIMEA
DlgDirSelectComboBoxExW
LoadKeyboardLayoutW
LoadBitmapA
GetWindowContextHelpId
GetMenuBarInfo
CreateDialogIndirectParamA
SetFocus
GetDlgItemInt
DestroyCaret
RemovePropA
SetCursor
KillTimer
PtInRect
WinHelpA
WindowFromDC
PackDDElParam
GetClipCursor
GetMenu
ReplyMessage
SetMenuItemInfoA
OpenInputDesktop
DdeCreateStringHandleA
CreateAcceleratorTableW
LoadImageW
CharToOemBuffW
RegisterClassA
GetLastInputInfo
SetWindowTextA
comdlg32
ReplaceTextW
CommDlgExtendedError
PrintDlgExW
shell32
ShellExecuteExA
SHBrowseForFolderA
ExtractAssociatedIconW
DragQueryFileA
SHFormatDrive
SHCreateDirectoryExA
ExtractAssociatedIconA
SHGetMalloc
SHGetPathFromIDList
SHCreateDirectoryExW
ShellAboutW
shlwapi
StrRChrA
StrRChrW
StrChrW
StrStrIA
StrCmpNA
StrStrIW
StrStrA
StrStrW
StrChrIA
comctl32
ImageList_GetImageInfo
ord15
ImageList_DragMove
ImageList_Write
ImageList_GetImageRect
ord6
ImageList_LoadImageW
ImageList_AddIcon
ord14
PropertySheetW
DrawStatusText
FlatSB_EnableScrollBar
GetMUILanguage
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ