T:\voter\Usenet\buttresses\retriev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_94264d813b6f70e68c682f438c36a64e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_94264d813b6f70e68c682f438c36a64e.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_94264d813b6f70e68c682f438c36a64e
-
Size
422KB
-
MD5
94264d813b6f70e68c682f438c36a64e
-
SHA1
895b090f1e0741a7e88c5cec3fc981bdd869ab90
-
SHA256
247a7762ff3b68fdf3992544be7c136a6ad37569cf7139191efd890294a6f3a3
-
SHA512
9984177bec1dbec299eedbd8bd5bbc685223d0cdad8f82e8c68fe083bbf385021e5000b6b0d1421743216b99929f5799cab07b0cb5471bd733b75c78b17d533d
-
SSDEEP
12288:k/Oh6y9tbiQPB+8TViavLwFQPR/KZHxBH:PBRiQPBXiavoQcvBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_94264d813b6f70e68c682f438c36a64e
Files
-
VirusShare_94264d813b6f70e68c682f438c36a64e.exe windows:5 windows x86 arch:x86
ed6f9020aed92f9652820ce6a8386e71
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
MultiByteToWideChar
FlushFileBuffers
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
LCMapStringA
TlsFree
TlsAlloc
TlsGetValue
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
RaiseException
GetConsoleMode
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
SetEndOfFile
GetProcessHeap
ReadFile
lstrcpyA
DeleteFileA
LocalFree
GetCurrentDirectoryA
Sleep
WriteFile
GetCurrentProcess
GetConsoleCP
WideCharToMultiByte
RtlUnwind
ExitProcess
GetModuleHandleW
HeapFree
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
lstrlenW
GetModuleHandleA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetCommandLineA
LocalAlloc
LoadLibraryA
GetProcAddress
TlsSetValue
GetLastError
HeapAlloc
InterlockedIncrement
CreateFileA
EnterCriticalSection
LeaveCriticalSection
user32
GetDialogBaseUnits
DestroyIcon
RegisterClassA
LoadCursorA
FindWindowA
DestroyMenu
MapWindowPoints
IsWindowVisible
MoveWindow
DialogBoxParamA
EndPaint
keybd_event
GetClassNameA
GetWindowRect
CreateDialogParamA
PostQuitMessage
SendDlgItemMessageA
FillRect
GetSubMenu
SetForegroundWindow
LoadBitmapA
GetParent
LoadMenuA
LoadIconA
MessageBeep
wsprintfA
DrawIcon
FindWindowExA
GetClientRect
CreateMenu
SendMessageA
BeginPaint
EnumWindows
GetWindowTextA
MessageBoxA
GetAncestor
CreateWindowExA
GetDlgItem
EndDialog
DefWindowProcA
SetWindowPos
ShowWindow
CreatePopupMenu
AppendMenuA
IsWindow
RemoveMenu
CheckRadioButton
GetSystemMetrics
gdi32
DeleteObject
BitBlt
GetTextExtentPoint32A
DeleteDC
CreateFontA
GetDeviceCaps
CreateFontIndirectA
TextOutA
SelectObject
CreateCompatibleDC
SaveDC
GdiAlphaBlend
CreatePen
GetStockObject
RestoreDC
comdlg32
GetOpenFileNameA
advapi32
ConvertSidToStringSidA
CreateWellKnownSid
OpenProcessToken
shell32
SHGetFileInfoA
ole32
CoCreateInstance
wininet
InternetOpenUrlW
ws2_32
WSAEventSelect
WSACreateEvent
WSAWaitForMultipleEvents
recvfrom
WSAGetLastError
winmm
mciSendCommandA
iphlpapi
NotifyAddrChange
shlwapi
StrDupA
SHCreateStreamOnFileEx
ord597
comctl32
ImageList_ReplaceIcon
ImageList_Add
ord17
ImageList_Create
authz
AuthzInitializeResourceManager
AuthzFreeResourceManager
AuthzFreeContext
AuthzInitializeContextFromSid
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 143KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ