Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6292d00ac010b090f6a549497949c7b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_6292d00ac010b090f6a549497949c7b0.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_6292d00ac010b090f6a549497949c7b0
-
Size
162KB
-
MD5
6292d00ac010b090f6a549497949c7b0
-
SHA1
2186e6029b27062ff374660f3045c48a969425c0
-
SHA256
c275b59d6c59e5b4880a845d639c1b0c7cd2fc6e73c0a7117849415f7c631e8d
-
SHA512
81a00022f681e33200576815343b090937ccf9a0daab1a782b0b00b51d4a06cdc3d9395ff2d34938cdee6168da5f203d21b9e8c5c0c0b40dd342af5b12c9a104
-
SSDEEP
3072:98vcOHxvmp+Kl2l0D2B3rOWx1IcYfG1sPv:qUOHBa+KlJ6NrOWx1ue1sPv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_6292d00ac010b090f6a549497949c7b0
Files
-
VirusShare_6292d00ac010b090f6a549497949c7b0.exe windows:5 windows x86 arch:x86
a223b7f28a01ee598694711375a4b11f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtClose
RtlUnwind
mpr
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
kernel32
GetProcessTimes
GetCurrentThreadId
GetCurrentProcessId
GetThreadTimes
LoadLibraryA
HeapReAlloc
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
InterlockedCompareExchange
HeapDestroy
HeapCreate
HeapSize
MultiByteToWideChar
GetDriveTypeW
GetLogicalDriveStringsW
GetLongPathNameW
GetComputerNameExW
ExpandEnvironmentStringsW
GetLastError
FindClose
FindNextFileW
GetModuleHandleW
GetProcAddress
GetNativeSystemInfo
GetSystemTimeAsFileTime
GetVersionExW
CloseHandle
TerminateProcess
GetModuleFileNameW
GetProcessHeap
CreateThread
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
Sleep
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
WriteFile
ExitProcess
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
GetCurrentThread
GetTickCount
GetCurrentProcess
GetStringTypeW
LoadLibraryW
IsProcessorFeaturePresent
FlushFileBuffers
SetStdHandle
WriteConsoleW
CreateFileW
InitializeCriticalSectionAndSpinCount
GetStdHandle
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
SetHandleCount
user32
CreateWindowExW
MessageBoxW
GetSystemMetrics
SendMessageW
UpdateWindow
EnableWindow
DefWindowProcW
ShowWindow
ExitWindowsEx
GetFocus
GetCapture
GetForegroundWindow
GetDesktopWindow
GetActiveWindow
GetClipboardOwner
GetShellWindow
GetOpenClipboardWindow
RegisterClassExW
TranslateMessage
GetClientRect
PostQuitMessage
GetMessageW
DispatchMessageW
GetKBCodePage
gdi32
CreateFontW
GetStockObject
SetTextColor
advapi32
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
shell32
SHGetFolderPathW
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ