perfmon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_a02f15ea7d6a8d51612091ba8a355c10.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
virussign.com_a02f15ea7d6a8d51612091ba8a355c10.exe
Resource
win10v2004-20240508-en
General
-
Target
virussign.com_a02f15ea7d6a8d51612091ba8a355c10.vir
-
Size
153KB
-
MD5
a02f15ea7d6a8d51612091ba8a355c10
-
SHA1
c907c7fb1bed10f65b3e06367ec81e62a53f1428
-
SHA256
1c80f0d0762b4483130f3595ab3add2e8ef025abdde4b443a67847380612802d
-
SHA512
c43078c290cd072a0435bd2bdb4b79406e302209237ae8599735156229873b48492641628b413233c802f821f6967bdb610029c0abebefd1e8085ac87dd316fe
-
SSDEEP
3072:GOmxZOpy4r2100HfSoLewfmay1h4u1KS5:x+ZOI4s/HqoKORng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_a02f15ea7d6a8d51612091ba8a355c10.vir
Files
-
virussign.com_a02f15ea7d6a8d51612091ba8a355c10.vir.exe windows:6 windows x86 arch:x86
01e97d0044926412064ff246f90f6933
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
kernel32
GetLastError
HeapFree
HeapAlloc
GetProcessHeap
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetCommandLineW
FreeLibrary
FormatMessageW
CopyFileW
GetVersion
CloseHandle
GetCurrentProcess
IsWow64Process
LocalFree
CreateProcessW
ExpandEnvironmentStringsW
RegisterApplicationRestart
CreateThread
GetProcAddress
HeapSetInformation
Sleep
GetFileAttributesW
GetLocaleInfoW
ExpandEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
GetStdHandle
MapViewOfFile
CreateFileMappingW
GetVersionExW
UnmapViewOfFile
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SearchPathW
LoadLibraryA
WaitForSingleObject
GetConsoleOutputCP
WriteConsoleW
WriteFile
GetConsoleMode
GetFileType
FindClose
FindNextFileW
FindFirstFileW
CreateFileW
LoadLibraryExW
LoadResource
FindResourceExW
gdi32
GetDeviceCaps
user32
LoadIconW
PostMessageW
DefWindowProcW
EnableMenuItem
CheckMenuRadioItem
CheckMenuItem
SetLayeredWindowAttributes
GetWindowPlacement
CopyRect
EndDialog
LoadStringW
IsWindow
GetFocus
DestroyWindow
ShowWindow
PostQuitMessage
WaitForInputIdle
DeleteMenu
GetMenu
GetProcessDefaultLayout
DispatchMessageW
TranslateMessage
GetMessageW
CharToOemW
LoadAcceleratorsW
GetMonitorInfoW
MonitorFromPoint
GetWindowRect
GetDlgItem
SetWindowTextW
SetWindowPos
SetFocus
DialogBoxParamW
CreateWindowExW
RegisterClassExW
GetSysColor
UpdateWindow
EnumWindows
IsIconic
GetClassNameW
GetClientRect
SendMessageW
SystemParametersInfoW
GetDesktopWindow
GetDC
ReleaseDC
TranslateAcceleratorW
msvcrt
wcsncmp
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_wcsicmp
memcpy
wcstok
wcsrchr
wcschr
_wmakepath_s
_wsplitpath_s
_XcptFilter
_exit
_cexit
__wgetmainargs
_wcsnicmp
towlower
wcsstr
memset
_vsnwprintf
_except_handler4_common
bsearch
atl
ord41
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
ntdll
NtOpenProcessToken
NtClose
NtQueryInformationToken
WinSqmIncrementDWORD
WinSqmAddToStream
NtOpenThreadToken
shlwapi
ord186
SHCreateStreamOnFileEx
shell32
CommandLineToArgvW
ShellExecuteExW
ord28
SHBindToParent
SHGetIDListFromObject
SHCreateDataObject
ord155
SHGetFolderPathEx
oleaut32
VarDateFromStr
VariantTimeToSystemTime
VariantChangeType
OleCreateFontIndirect
VariantInit
VariantClear
SysAllocString
SysFreeString
credui
CredUIPromptForCredentialsW
secur32
GetUserNameExW
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE