Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_18b1e69af7a77e66bf7ac1cd075a79b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_18b1e69af7a77e66bf7ac1cd075a79b7.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_18b1e69af7a77e66bf7ac1cd075a79b7
-
Size
207KB
-
MD5
18b1e69af7a77e66bf7ac1cd075a79b7
-
SHA1
1660f7092d13e2fb4a593d87e0f07712f4c67634
-
SHA256
0778db31d7e3259a65affc28ca1a317c67105a3fa75250b7370a5dfa70585c0c
-
SHA512
07543b5403ae3a22211d1c6d18af7b21c0b9ea35dc377eceb3f7ff2c77c144d7170ae1fed5d616ad158211b00cc93644c0a773ac8dcac481feef0d3059a219b1
-
SSDEEP
3072:rzkTIdtOHX1o/LgSVtFliee6HcQLkW+0J03r0NW85R6zeDmxGCaVhH:rzk8dtUC/Lg4t3eVukW+0J/F5Ueyt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_18b1e69af7a77e66bf7ac1cd075a79b7
Files
-
VirusShare_18b1e69af7a77e66bf7ac1cd075a79b7.exe windows:5 windows x86 arch:x86
9f8ee3a7a697ac1fcb23ae874692b996
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
InterlockedDecrement
lstrcpyA
lstrlenW
MultiByteToWideChar
AreFileApisANSI
lstrcpynA
FreeLibrary
GetLastError
lstrlenA
CloseHandle
CreateMutexA
SetLastError
GetFileAttributesA
LocalFree
GetProcAddress
LoadLibraryA
CancelWaitableTimer
GetTickCount
GetProcessHeap
ActivateActCtx
GetACP
OpenWaitableTimerA
GlobalFindAtomW
GetOEMCP
CancelIo
GetCurrentProcessId
GetFullPathNameA
GetVersion
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
VirtualProtect
user32
CharLowerA
IsWindowUnicode
GetDesktopWindow
IsWindowVisible
IsZoomed
GetDlgCtrlID
EnableWindow
UpdateWindow
SetRect
ReleaseCapture
SetCapture
SetWindowTextA
GetWindowRect
EnumChildWindows
DefWindowProcA
GrayStringA
GetParent
PtInRect
IsWindow
FillRect
GetSystemMetrics
GetWindowTextA
GetSystemMenu
SetForegroundWindow
wsprintfW
IsWindowEnabled
GetTopWindow
SendMessageA
TabbedTextOutA
DrawTextA
OffsetRect
gdi32
SetPixel
CreateFontIndirectA
LPtoDP
CreatePalette
Polyline
GetTextColor
BitBlt
PtVisible
PtInRegion
TextOutA
DPtoLP
CreatePolygonRgn
SetRectRgn
CombineRgn
RectVisible
CreateRectRgn
GetObjectA
advapi32
RegEnumValueA
CryptDeriveKey
CryptAcquireContextA
CryptDecrypt
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyExA
FreeSid
IsTextUnicode
CryptCreateHash
LsaFreeMemory
RegCloseKey
RegSetValueExW
RegOpenCurrentUser
LsaOpenPolicy
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
RegQueryValueExW
LsaClose
CryptDestroyHash
CryptReleaseContext
EqualSid
RegDeleteValueA
CryptHashData
CryptDestroyKey
RegSetValueExA
RegQueryValueExA
CryptEncrypt
RegOpenKeyW
shell32
ShellExecuteA
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
StringFromCLSID
CoInitialize
CoTaskMemFree
CLSIDFromProgID
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
oledlg
ord8
OleUIBusyW
msvcrt
_adjust_fdiv
_CIsin
_controlfp
exit
free
_vsnprintf
_strdup
_initterm
_mbscmp
__getmainargs
_splitpath
_acmdln
__dllonexit
_onexit
_except_handler3
__setusermatherr
__CxxFrameHandler
_exit
??1type_info@@UAE@XZ
_setmbcp
_mbsicmp
_CxxThrowException
_XcptFilter
?terminate@@YAXXZ
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ydata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss1 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ