Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_776878b779fcdd187f1a627c882ae6c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_776878b779fcdd187f1a627c882ae6c0.exe
Resource
win10v2004-20231222-en
General
-
Target
VirusShare_776878b779fcdd187f1a627c882ae6c0
-
Size
697KB
-
MD5
776878b779fcdd187f1a627c882ae6c0
-
SHA1
625e41a2d1b181ee45dd76c7b0b0415dcabc2dd1
-
SHA256
2cfeab3a65d172dcc17f2b28b8e67f9195dd7f0f88b9b868743dc3a9df512c32
-
SHA512
278539f21f042e6d25d2d429ae7e00aa139c99fa4006376e33e7ad61d136f04f957eb3f893942b21f0a1ed022e6083d5767b4ac631fb2934ce117cb65c1c8abb
-
SSDEEP
6144:6XlsRIo0K7Td3vG6R6dDiQ8+9nWkWIGmtJQGTJw+h9YGy0ZW+oxiFhGulEkyY:WAILkfG6RaU+8mtJRlYGB4+YiFhz2N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_776878b779fcdd187f1a627c882ae6c0
Files
-
VirusShare_776878b779fcdd187f1a627c882ae6c0.exe windows:5 windows x86 arch:x86
e93ad77b87b68ce4e910e1ea031f8f00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
HeapAlloc
HeapFree
HeapSetInformation
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalAlloc
LocalFree
GetLastError
QueryPerformanceCounter
GetProcAddress
ReadFile
RtlCaptureContext
SetEnvironmentVariableW
SetEvent
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
VirtualAllocEx
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetOverlappedResult
GetModuleHandleW
RaiseException
GetModuleHandleA
FreeLibrary
FlushFileBuffers
EnterCriticalSection
DeviceIoControl
DeleteCriticalSection
CreateThread
CreateFileW
CreateEventW
CloseHandle
OutputDebugStringA
BindIoCompletionCallback
user32
LoadIconW
LoadCursorA
GetSystemMetrics
gdi32
CreateHalftonePalette
FillPath
CreateMetaFileA
advapi32
TraceEvent
RegisterTraceGuidsW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
ConvertStringSidToSidW
TraceMessage
UnregisterTraceGuids
RegQueryValueExA
RevertToSelf
ole32
CoInitializeEx
CLSIDFromString
CoUninitialize
msvcrt
wcsncmp
memset
memcpy
exit
_XcptFilter
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_amsg_exit
_cexit
_controlfp
_errno
_exit
_initterm
_lock
_onexit
_purecall
_unlock
_vsnprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 666KB - Virtual size: 666KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ