Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_488b774637c6e986593af53c8e7e494b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_488b774637c6e986593af53c8e7e494b.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_488b774637c6e986593af53c8e7e494b
-
Size
233KB
-
MD5
488b774637c6e986593af53c8e7e494b
-
SHA1
01c7e9e6916f5d65aa0c97656c503d43f3fd48f9
-
SHA256
8a37ced023334bce55386dc81da9dda8624b6a18380ac1716cb60bd1e3f45f47
-
SHA512
f61e719beffd40113edb3b5cc3e9df89a4561d450f876a09045776325e7d6a22da215193f4a4b4a285cee11716971e0c7efd25861ee0c9776e434f2691db33f7
-
SSDEEP
3072:pDTDTDdQNA2DmwtFA5Lf87RSLcQnExb5R0vR5IQ/7t15:pXXwvtFAZf8zQE3S5t7t15
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_488b774637c6e986593af53c8e7e494b
Files
-
VirusShare_488b774637c6e986593af53c8e7e494b.exe windows:5 windows x86 arch:x86
70b12e9828507704436e8eae3e8bf078
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetModuleHandleW
AddConsoleAliasA
BackupSeek
BeginUpdateResourceW
ChangeTimerQueueTimer
CreateConsoleScreenBuffer
CreateDirectoryExW
CreateMailslotA
CreateMailslotW
CreateNamedPipeW
CreateTapePartition
CreateToolhelp32Snapshot
DeleteVolumeMountPointW
EnumCalendarInfoExW
EnumDateFormatsA
EnumSystemCodePagesW
EnumSystemLocalesW
FindNextVolumeMountPointA
FindNextVolumeW
GetAtomNameW
GetCPInfo
GetCPInfoExW
GetCommMask
GetCommProperties
GetCommandLineW
GetComputerNameA
GetConsoleAliasA
GetConsoleAliasExesA
GetConsoleAliasExesLengthW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcessId
GetDiskFreeSpaceExW
GetDriveTypeA
GetFileAttributesExA
GetFileInformationByHandle
GetLocaleInfoW
GetModuleFileNameA
GetNamedPipeHandleStateA
GetNumberOfConsoleMouseButtons
GetOEMCP
GetPrivateProfileStringW
GetProcAddress
GetProcessIoCounters
GetProfileStringA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryW
GetTempFileNameW
GetStartupInfoA
GetWindowsDirectoryW
GetWriteWatch
GlobalFree
GlobalGetAtomNameW
Heap32First
Heap32ListFirst
HeapFree
InterlockedDecrement
IsBadCodePtr
IsValidLocale
LoadLibraryExW
LocalFree
LocalShrink
LocalSize
LocalUnlock
LockResource
Module32First
MoveFileW
MultiByteToWideChar
OpenFile
OpenFileMappingA
OpenFileMappingW
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32NextW
ReadConsoleInputW
ReleaseMutex
ReplaceFileA
RequestDeviceWakeup
RtlFillMemory
SearchPathW
SetCommConfig
SetCommTimeouts
SetConsoleActiveScreenBuffer
SetConsoleTextAttribute
SetFileApisToANSI
SetHandleInformation
SetProcessAffinityMask
SetStdHandle
SetThreadExecutionState
SetThreadIdealProcessor
SetThreadPriorityBoost
SetTimerQueueTimer
SetUnhandledExceptionFilter
SystemTimeToFileTime
VirtualAllocEx
WriteConsoleW
WriteFileEx
lstrcpyn
GetTimeFormatA
CreateFileW
user32
LoadIconW
LoadCursorA
advapi32
RegOpenKeyExW
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ