Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_db1dff61610855b3574d5c359186f0d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_db1dff61610855b3574d5c359186f0d7.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_db1dff61610855b3574d5c359186f0d7
-
Size
229KB
-
MD5
db1dff61610855b3574d5c359186f0d7
-
SHA1
ab66481d14a7d35ca55ff08fd861ad03f864a4f7
-
SHA256
990f5172eb48e988c238b3b5623c0d64644f219e68d822ae630030f643a3d131
-
SHA512
3e197088b9a4d835dcbf42a2881fc4086f7f3db248b7d2aab0de3f0b2b2b27595a3f7175f0168ac8d6282a0d23eeae49d1a576d60788957904077520553d4066
-
SSDEEP
3072:abVh+1EqrA9Mnv7gH5xhiVDaFZ+E5WEO2xWP0YbjCbtsiGBs87d6R2x70hstbc:aZU7zgH7hiZaFZ+khOW1yObtFGtJ10sW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_db1dff61610855b3574d5c359186f0d7
Files
-
VirusShare_db1dff61610855b3574d5c359186f0d7.exe windows:5 windows x86 arch:x86
9c7cf11a185272d48d4376ba1d9b8d0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InsertMenuItemA
CreateWindowStationW
SendDlgItemMessageW
UnregisterHotKey
CharToOemA
DdeCmpStringHandles
ChangeDisplaySettingsExW
TabbedTextOutW
GetWindowTextLengthA
DestroyCursor
CallWindowProcA
DlgDirSelectExA
SetWindowTextA
IsWindowVisible
CheckRadioButton
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetMalloc
advapi32
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
gdi32
SetTextAlign
CreateBrushIndirect
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
kernel32
GetStringTypeA
GetConsoleMode
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
LCMapStringA
ReadFile
GetConsoleCP
SetEnvironmentVariableA
CreateFileA
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
LockResource
PeekNamedPipe
GetNamedPipeInfo
GetFileAttributesExW
CallNamedPipeW
TransactNamedPipe
FillConsoleOutputCharacterA
CreateEventA
GlobalAddAtomW
SetComputerNameExA
GetLastError
MoveFileA
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RaiseException
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
Sections
.hrumer Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.upi Size: 147KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ