Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_3ba5a483f64a16119b211926350fc863.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_3ba5a483f64a16119b211926350fc863.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_3ba5a483f64a16119b211926350fc863
-
Size
272KB
-
MD5
3ba5a483f64a16119b211926350fc863
-
SHA1
07b507a94649793d69ee160164273d87fc51308c
-
SHA256
726d340930add61f000fb8da87e64e2c1422e6a4971e975c1e9117b0526f3ebe
-
SHA512
2e26b7f9b368c6a4bebca945ffe7733cb3f3a44f7e4d336e490ee15f4298e98648a199e2bc2f39022f891c51390f540ca90a0fbd53d9b3c275a3b503ab3c2d51
-
SSDEEP
6144:HlsE0m7nH59VtNqvIA82Zk1pBKFyMjGnyEf:Fp04nDVtUlw4FlGf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_3ba5a483f64a16119b211926350fc863
Files
-
VirusShare_3ba5a483f64a16119b211926350fc863.exe windows:5 windows x86 arch:x86
c42e7832ca752314526a7773d4d3dbc6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
GetFileSize
GetLocalTime
GetLocaleInfoA
GetModuleFileNameW
GetModuleHandleA
GetShortPathNameW
GetStartupInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetEndOfFile
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WriteFile
lstrcmpiA
lstrlenA
GetCurrentProcess
FindNextFileA
FindFirstFileA
FindClose
CreateFileA
CloseHandle
VirtualAllocEx
GetTickCount
CreateFileW
user32
TranslateMessage
ShowWindow
SetForegroundWindow
SetFocus
MessageBoxA
IsDlgButtonChecked
IsDialogMessageA
GetDesktopWindow
EndDialog
DialogBoxParamA
LoadIconW
CreateDialogParamA
CheckDlgButton
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
RegOverridePredefKey
ole32
CoUninitialize
CoGetMalloc
CoCreateInstance
CoTaskMemRealloc
CoInitialize
shlwapi
wnsprintfA
StrFormatByteSize64A
Sections
.text11 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text10 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text9 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text8 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
FFF2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
FFF Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
9 Size: 1024B - Virtual size: 838B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ