Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1b9f7d4c8a918cc8fb1cddadab9ee81b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_1b9f7d4c8a918cc8fb1cddadab9ee81b.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_1b9f7d4c8a918cc8fb1cddadab9ee81b
-
Size
162KB
-
MD5
1b9f7d4c8a918cc8fb1cddadab9ee81b
-
SHA1
acafa2ca62e52e123de91eca40ea5befa483a8b3
-
SHA256
6a1c3a7498b3af751455d2e6b7fc45f0304c6946d59b389ec068686985b3e3d8
-
SHA512
e4cd8ca140d8898aa04e2d23c913f1bd2b5b608eca2c77ab941823a2e5f0e02ebf4b3096e62780a5b3f29f8a920068c27759e0636f00fbf1c8405b4002be2811
-
SSDEEP
3072:8yZ46XNPEMSlg3Ld2OuS41iWoBlH7VtMPTcOm3jn3zeBzd3An1YgCQSPH96PHNrR:8yy6XN1SCUDoDB1DjOmb3zeBzJAn3ClG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_1b9f7d4c8a918cc8fb1cddadab9ee81b
Files
-
VirusShare_1b9f7d4c8a918cc8fb1cddadab9ee81b.exe windows:5 windows x86 arch:x86
ad73a0301c97560977097bcbba84d2db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
GetFullPathNameA
lstrcpyA
GetProcAddress
AreFileApisANSI
GetLastError
LoadLibraryA
GetModuleFileNameA
GlobalAlloc
CreateMutexA
lstrlenW
GetFileAttributesA
InterlockedDecrement
GetStartupInfoA
CreateProcessA
SetLastError
GlobalFree
ActivateActCtx
GetACP
GetOEMCP
LocalFree
VirtualProtect
OutputDebugStringA
lstrlenA
lstrcpynA
user32
GetKeyboardLayout
IsWindowUnicode
IsWindowVisible
GetDlgCtrlID
SetWindowTextA
SetForegroundWindow
DrawTextA
GetSystemMetrics
IsWindow
UpdateWindow
SendMessageA
GetForegroundWindow
IsZoomed
SetCapture
GetWindowRect
GetWindowTextA
TabbedTextOutA
PtInRect
GrayStringA
DefWindowProcA
EnumChildWindows
GetParent
EnableWindow
GetSystemMenu
GetDoubleClickTime
FillRect
OffsetRect
ReleaseCapture
SetRect
gdi32
AngleArc
AddFontMemResourceEx
AbortDoc
RectVisible
LPtoDP
SetRectRgn
BitBlt
TextOutA
CreateFontIndirectA
DPtoLP
CreatePolygonRgn
GetTextColor
CombineRgn
Polyline
CreatePalette
CreateRectRgn
PtInRegion
GetObjectA
SetPixel
PtVisible
AbortPath
advapi32
LsaFreeMemory
CryptDestroyHash
LsaClose
RegCloseKey
RegOpenKeyExW
CryptDeriveKey
RegOpenKeyExA
RegDeleteValueA
RegDeleteValueW
CryptEncrypt
RegEnumValueA
CryptAcquireContextA
LsaOpenPolicy
EqualSid
CryptReleaseContext
RegEnumValueW
RegCreateKeyExA
FreeSid
RegCreateKeyExW
CryptCreateHash
CryptDestroyKey
CryptDecrypt
RegSetValueExW
RegQueryValueExW
IsTextUnicode
RegQueryValueExA
RegDeleteKeyW
RegOpenCurrentUser
RegEnumKeyW
CryptHashData
RegSetValueExA
RegOpenKeyW
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ole32
CoInitialize
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoUninitialize
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
oledlg
OleUIBusyW
msvcrt
_XcptFilter
_CIcos
_onexit
calloc
_mbscmp
__set_app_type
_initterm
_vsnprintf
??1type_info@@UAE@XZ
_controlfp
__CxxFrameHandler
?terminate@@YAXXZ
__setusermatherr
free
__p__commode
_mbsicmp
__getmainargs
_strdup
__p__fmode
_setmbcp
_except_handler3
_splitpath
_adjust_fdiv
_CxxThrowException
exit
_exit
_acmdln
__dllonexit
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ