Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_31af7b1ad1ae90b4b57573391940b66f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_31af7b1ad1ae90b4b57573391940b66f.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_31af7b1ad1ae90b4b57573391940b66f
-
Size
417KB
-
MD5
31af7b1ad1ae90b4b57573391940b66f
-
SHA1
cb1c7a5d8fffc7c96ab2b9e74bc50cb4c35b012d
-
SHA256
a9d0f311dfb9d28ee464dbe790a8cdeb69bdfd560701e1fd2671488d3c3e6a75
-
SHA512
b8806cb65d9443a6fa558a4d77e5554e53f25924fc84822e1d20d53265c62f82fbd87ce81d9e2f51e69b84f3ae946926e33afc18394261185d6f98d735bdd2fc
-
SSDEEP
12288:C1eg6blgUtWnLbj7LGgqHIxfoCsJj5YMK:C6blgtbvLGgxfob14
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_31af7b1ad1ae90b4b57573391940b66f
Files
-
VirusShare_31af7b1ad1ae90b4b57573391940b66f.exe windows:5 windows x86 arch:x86
4e24df55d5c2d4473c9a9bd4e4054609
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyboardType
LoadStringA
GetSysColor
wsprintfW
LoadMenuW
AdjustWindowRect
AppendMenuA
BeginPaint
CallWindowProcA
CheckDlgButton
CheckMenuItem
CheckRadioButton
ClientToScreen
CloseClipboard
CreateCaret
CreateDialogParamA
CreateMDIWindowA
CreateMenu
CreatePopupMenu
CreateWindowExA
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
DestroyCaret
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawMenuBar
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumChildWindows
EnumThreadWindows
EnumWindows
FillRect
FrameRect
GetCapture
GetClassInfoA
GetClassLongA
GetClassNameA
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDesktopWindow
GetDialogBaseUnits
GetDlgCtrlID
GetDlgItem
GetDlgItemTextA
GetKeyState
GetMenu
GetMenuItemCount
GetMenuItemID
GetMenuStringA
GetParent
GetScrollPos
GetSubMenu
CharNextA
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
InsertMenuA
IntersectRect
InvalidateRect
IsDlgButtonChecked
IsIconic
IsWindow
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadImageA
MapDialogRect
MapVirtualKeyA
MessageBoxA
MoveWindow
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PostThreadMessageA
RedrawWindow
RegisterClassA
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetCapture
SetCaretPos
SetClipboardData
SetCursor
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowCaret
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnregisterClassA
UpdateWindow
WinHelpA
WindowFromPoint
wsprintfA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
advapi32
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
gdi32
SetTextColor
SetTextAlign
kernel32
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LCMapStringW
HeapReAlloc
QueryPerformanceCounter
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTimeZoneInformation
EnumSystemLocalesA
IsValidCodePage
IsDebuggerPresent
SetUnhandledExceptionFilter
GetModuleHandleW
GetSystemTimeAsFileTime
GetTimeFormatA
InterlockedDecrement
InterlockedIncrement
CloseHandle
ContinueDebugEvent
CreateDirectoryA
CreateFileA
CreateProcessA
DebugActiveProcess
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushInstructionCache
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetConsoleMode
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetThreadContext
GetThreadPriority
GetThreadSelectorEntry
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MoveFileA
MulDiv
MultiByteToWideChar
OpenProcess
RaiseException
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SearchPathA
SetConsoleCtrlHandler
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetThreadContext
SetThreadLocale
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerLanguageNameA
VirtualAlloc
VirtualFree
VirtualProtect
WaitForDebugEvent
FlushFileBuffers
GetLocaleInfoW
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetStartupInfoA
GlobalFindAtomA
CompareStringA
CreateEventA
CreateThread
EnumCalendarInfoA
FormatMessageA
FreeResource
GetDateFormatA
GetDiskFreeSpaceA
GetFullPathNameA
GetStringTypeExA
GetSystemInfo
GlobalAddAtomA
GlobalDeleteAtom
GlobalHandle
ResetEvent
SetEndOfFile
SetErrorMode
SizeofResource
WaitForSingleObject
GetThreadLocale
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualQuery
LocalAlloc
LocalFree
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
lstrcpyW
lstrcpyA
lstrcmpiW
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
Sections
.text Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.github Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ