Behavioral task
behavioral1
Sample
virussign.com_e059062b5127eb0961f5bcf390b76bf0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
virussign.com_e059062b5127eb0961f5bcf390b76bf0.exe
Resource
win10v2004-20240426-en
General
-
Target
virussign.com_e059062b5127eb0961f5bcf390b76bf0.vir
-
Size
224KB
-
MD5
e059062b5127eb0961f5bcf390b76bf0
-
SHA1
40ff3a0ec34c56d60b2c04df76d6f954c298a3c6
-
SHA256
4362e8a6c7833a75ca246a2cce18faff015586cc8816fe1c3a1c84c2f3ad4bff
-
SHA512
0265eceacf3f005d8638dcc77b0daed6dad8c78b771bd7c5edf2fb0aa701d23594a617ceaddb8bb7abc6b217aed4584fb49fe9a923d07de860131dd1abba5cc7
-
SSDEEP
1536:mYHR2BobiS4jHHNOeUJNE2GGOXEIJY+gPeodE+7n0:Rxqo+ftlUPAGOG+gGIE+7n0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_e059062b5127eb0961f5bcf390b76bf0.vir
Files
-
virussign.com_e059062b5127eb0961f5bcf390b76bf0.vir.exe windows:4 windows x86 arch:x86
75ffdda10503ce72a1439f242bc14531
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
InterlockedExchange
GetTickCount
GetLastError
GetFileAttributesA
GetCurrentThread
TerminateProcess
VirtualAlloc
OpenEventW
GetProcAddress
OpenSemaphoreA
FindClose
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RaiseException
RemoveDirectoryA
Sleep
OpenEventA
GetThreadPriority
SetFilePointer
FlushFileBuffers
LoadLibraryA
GetOEMCP
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
CloseHandle
advapi32
OpenServiceW
gdi32
CreateBitmap
user32
LoadIconA
ReleaseDC
MessageBoxW
EnableWindow
WaitForInputIdle
LoadCursorW
winscard
SCardForgetReaderW
ws2_32
select
Sections
UPX0 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE