viskaluj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0eae2987f480188e00ae8e82bc6c09d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_0eae2987f480188e00ae8e82bc6c09d0.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_0eae2987f480188e00ae8e82bc6c09d0
-
Size
96KB
-
MD5
0eae2987f480188e00ae8e82bc6c09d0
-
SHA1
00d7e9f95c60b70a1918fab2f800bb99a51dec7f
-
SHA256
6304ebf0a5918a1f909d3f1b22a50b0abb892d585fca06890c0b8fde40fb1bd0
-
SHA512
825ee494bfeb2c3a9a21d83d4583b7dd90ba62d3612ff47d750ef25ead507af328778b79104927fb3c84db2ca484a52192e9bd1cac63df8b182377e4873b8cf7
-
SSDEEP
384:cQFP4HRYM+TIJdg1gbcIM6RWxojo09OVeJP4HRYM+T9ziULiSKnCkhEjOPH21Mpa:DuKT0dg1KEooaUrKT9+7TQOPiKKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_0eae2987f480188e00ae8e82bc6c09d0
Files
-
VirusShare_0eae2987f480188e00ae8e82bc6c09d0.exe windows:4 windows x86 arch:x86
d568a2759f37043b45b2b34a6629c039
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetCaretPos
PostMessageA
SetFocus
DrawIcon
SetCursorPos
IsZoomed
GetMessageA
IsCharLowerA
IsDialogMessageA
DialogBoxParamW
CreateWindowExW
DispatchMessageA
IsWindow
shlwapi
PathCombineA
UrlIsA
UrlIsOpaqueA
UrlCombineA
PathCommonPrefixA
UrlCanonicalizeA
UrlGetLocationA
UrlCompareA
UrlIsNoHistoryA
PathCompactPathA
UrlHashA
kernel32
CopyFileA
GetDateFormatW
GetTickCount
IsValidLocale
GetDiskFreeSpaceA
GetCurrentProcess
FindResourceExA
FormatMessageA
WriteProcessMemory
InterlockedDecrement
CompareStringW
HeapCreate
LoadLibraryA
GetConsoleAliasW
WriteFile
GetAtomNameA
GetCurrentThreadId
ExpandEnvironmentStringsA
GetPrivateProfileIntA
SetFileAttributesW
CreateMutexA
GetComputerNameA
GetFullPathNameA
SetEnvironmentVariableA
GetProcessHeap
GetTimeFormatA
GetNumberFormatA
SleepEx
CreateSemaphoreW
GetSystemInfo
InterlockedExchange
upnphost
DllRegisterServer
DllCanUnloadNow
ServiceMain
DllUnregisterServer
DllGetClassObject
crypt32
CertCreateCRLContext
CertDuplicateCRLContext
CryptFindOIDInfo
CertNameToStrA
CertFindExtension
CryptEnumOIDInfo
CertControlStore
CertOpenStore
CertFindChainInStore
CertSaveStore
CertFindAttribute
CertDuplicateStore
CertAlgIdToOID
CryptEncodeObject
wtsapi32
WTSVirtualChannelClose
WTSEnumerateProcessesA
WTSLogoffSession
WTSQuerySessionInformationA
WTSSetUserConfigW
WTSVirtualChannelQuery
WTSUnRegisterSessionNotification
WTSCloseServer
WTSEnumerateServersA
WTSEnumerateSessionsA
authz
AuthzFreeContext
AuthzAddSidsToContext
AuthzInitializeContextFromSid
AuthzFreeResourceManager
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ