Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_15af6ac7478dbd39ca34a3c6852f5b5b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VirusShare_15af6ac7478dbd39ca34a3c6852f5b5b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_15af6ac7478dbd39ca34a3c6852f5b5b
-
Size
102KB
-
MD5
15af6ac7478dbd39ca34a3c6852f5b5b
-
SHA1
882ac36f5419a33fd59aa99576f5dda953f519cb
-
SHA256
943beee80a1c40852cf073b412e7f3b9b3bcdc235ce2a0d53df0afffbd80d48d
-
SHA512
039fb58ab573a89727ce964f68219fa62e84994961427a63c0dd49c55df6df0e12b482b5aff53b202920779bf2006d9c3d42c4a493944579d568f771007ea25c
-
SSDEEP
1536:cQUcBDDHCiCR1+VpGG7tF5dFbxQRao1aW7SgsktWvpMfCAj88S:i23HPc1EIEtF5HlQjr7fskwpMffoB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_15af6ac7478dbd39ca34a3c6852f5b5b
Files
-
VirusShare_15af6ac7478dbd39ca34a3c6852f5b5b.exe windows:5 windows x86 arch:x86
31553623c43827d554ad9e1b7dfa6a5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
FindNextFileW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetLogicalDrives
GetDriveTypeW
DeleteCriticalSection
LoadLibraryW
RtlUnwind
InitializeCriticalSection
GetSystemTime
GetTempFileNameW
CreateProcessW
GetModuleHandleA
GetProcAddress
GetCurrentProcess
FindFirstFileW
GetVolumeNameForVolumeMountPointA
GetWindowsDirectoryA
GetLocaleInfoA
FindClose
MultiByteToWideChar
WideCharToMultiByte
WaitForSingleObject
CreateThread
CopyFileW
GetTempPathW
Sleep
GetUserDefaultUILanguage
GetUserDefaultLangID
GetSystemDefaultLangID
SetUnhandledExceptionFilter
SetErrorMode
MulDiv
GetVersionExA
ExitProcess
GetModuleFileNameW
GetLastError
FlushFileBuffers
SetFileTime
GetSystemTimeAsFileTime
SetFilePointer
ReadFile
SetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
WriteFile
GetFileSizeEx
CreateFileW
CloseHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStringTypeW
LCMapStringW
HeapCreate
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapAlloc
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
GetModuleHandleW
user32
DrawTextW
SystemParametersInfoW
ReleaseDC
FrameRect
FillRect
GetSystemMetrics
GetDC
gdi32
CreateSolidBrush
GetDIBits
GetObjectA
SetBkMode
SetTextColor
CreateCompatibleBitmap
SelectObject
CreateFontA
DeleteObject
GetDeviceCaps
CreateCompatibleDC
DeleteDC
advapi32
CryptCreateHash
AccessCheck
MapGenericMask
DuplicateToken
OpenThreadToken
GetFileSecurityW
CryptHashData
SetTokenInformation
OpenProcessToken
CryptDestroyHash
CryptGetHashParam
RegSetValueExW
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptDestroyKey
shell32
SHGetFolderPathW
ShellExecuteW
wininet
InternetOpenA
InternetCloseHandle
InternetSetOptionA
HttpOpenRequestA
InternetQueryOptionA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
InternetReadFile
InternetConnectA
mpr
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
WNetOpenEnumW
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ