EpsonEULA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_c0d99d4a56cb376fec16b93018f8bc90.exe
Resource
win7-20231129-en
General
-
Target
virussign.com_c0d99d4a56cb376fec16b93018f8bc90.vir
-
Size
3.9MB
-
MD5
c0d99d4a56cb376fec16b93018f8bc90
-
SHA1
89ca8261089e81347e778bf0209e5bb91182049a
-
SHA256
7fe0c72ee4b60ed21f976dd7e3fab94ef1291079ede600588c186bc5b6e10c67
-
SHA512
599c2facc757e77acbf62cd4115c1954fe0f4c864ac7efe6071d0cab8eab1f0bed9a2299dbcb4f0480995a123a33c6ff47b5aef76e6955b0f98b5580d5e30f20
-
SSDEEP
49152:UKCOkTfkuFOGwtf3b8OsRTaFwI/iluG2ned5cFSixAa70u/rfz85WK+CksDM2jhN:FkTfu6MMQS7kGLws
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_c0d99d4a56cb376fec16b93018f8bc90.vir
Files
-
virussign.com_c0d99d4a56cb376fec16b93018f8bc90.vir.exe windows:5 windows x86 arch:x86
a0d61c01dfb9c2a9e1b34fda57336e7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
ExitProcess
HeapReAlloc
RaiseException
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
RtlUnwind
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
HeapAlloc
HeapFree
GetStartupInfoW
GetTickCount
GetFileSizeEx
FileTimeToLocalFileTime
SetErrorMode
GetFileTime
GetFileAttributesW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FileTimeToSystemTime
GetThreadLocale
lstrlenA
GlobalGetAtomNameW
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
WritePrivateProfileStringW
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
FreeResource
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalFree
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetLastError
ReadFile
WideCharToMultiByte
SetFilePointer
LoadLibraryW
GetModuleHandleW
GetLastError
LoadLibraryExW
WriteFile
DeleteFileW
CreateFileW
FreeLibrary
GetProcAddress
CloseHandle
GetModuleFileNameW
FindClose
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
MultiByteToWideChar
GetVersionExW
GetLocaleInfoW
GetUserDefaultLangID
LockResource
SizeofResource
LoadResource
UnhandledExceptionFilter
FindResourceW
user32
ReuseDDElParam
UnpackDDElParam
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatW
GetNextDlgGroupItem
MessageBeep
PostThreadMessageW
ReleaseCapture
LoadCursorW
SetCapture
KillTimer
SetTimer
SetWindowRgn
IsRectEmpty
LoadMenuW
SystemParametersInfoW
DestroyMenu
GetMenuItemInfoW
InflateRect
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
IsDlgButtonChecked
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
ShowOwnedPopups
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageW
LoadAcceleratorsW
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
IsWindow
LoadIconW
GetDC
ReleaseDC
GetScrollInfo
SetScrollInfo
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowPos
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetMenuState
GetMenuItemID
InsertMenuItemW
CreatePopupMenu
BringWindowToTop
TranslateAcceleratorW
InvalidateRgn
CopyAcceleratorTableW
SetRectEmpty
UnregisterClassW
CharUpperW
GetSysColorBrush
SendDlgItemMessageA
GetProcessDefaultLayout
GetWindowLongW
SetProcessDefaultLayout
SetWindowLongW
SendMessageW
InvalidateRect
GetSystemMenu
DeleteMenu
GetWindowRect
GetClientRect
IsIconic
GetSystemMetrics
DrawIcon
IntersectRect
WindowFromDC
SetRect
FillRect
EnableWindow
GetParent
CopyRect
UpdateWindow
CheckRadioButton
GetDlgCtrlID
PostMessageW
MapWindowPoints
GetClassNameW
GetWindow
CharNextW
CharPrevW
IsCharAlphaW
CharNextExA
PostQuitMessage
GetSubMenu
GetMenuItemCount
LoadBitmapW
gdi32
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateCompatibleDC
ScaleWindowExtEx
CreateFontIndirectW
CreateRectRgnIndirect
GetMapMode
DPtoLP
CreateEllipticRgn
LPtoDP
Ellipse
CreateCompatibleBitmap
GetRgnBox
GetBkColor
GetTextColor
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetPixel
BitBlt
DeleteObject
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
SetLayout
GetLayout
GetStockObject
GetTextExtentPoint32W
GetTextMetricsW
GetCurrentObject
CreateSolidBrush
CreateBrushIndirect
GetObjectW
GetWindowExtEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ord196
DragFinish
DragQueryFileW
ord195
shlwapi
PathFindFileNameW
PathCombineW
PathFindExtensionW
PathStripToRootW
PathRemoveFileSpecW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
VariantClear
SysAllocStringLen
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayCreate
SafeArrayDestroy
SysStringLen
VariantChangeType
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayGetDim
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 612KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE