Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1cd414da2994719c23c85f076efed410.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_1cd414da2994719c23c85f076efed410.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_1cd414da2994719c23c85f076efed410
-
Size
162KB
-
MD5
1cd414da2994719c23c85f076efed410
-
SHA1
1a0cb51942560793989856508302e7d2ff0e9750
-
SHA256
5cacccb46693962c67a3aef0df9a538201a44d309993915057e98b00b59cf7c3
-
SHA512
7fdb463c7a5684df2cf83c26a86c1c5c37e5f8460ca6d1f4278576e2f2ee2361fdf1e34e89fa94893614c076bd7629fe0bcd890514f27ec958b3957490944460
-
SSDEEP
3072:Wmt0KSEl6oIPc8Svm8FWKfML3tAcCHFTbcCqmBlH7qozDj3wxBMdQ3zeBzd3An1N:Wm1IoV7XFW5L3aF1B1bXwxj3zeBzJAnB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_1cd414da2994719c23c85f076efed410
Files
-
VirusShare_1cd414da2994719c23c85f076efed410.exe windows:5 windows x86 arch:x86
3980b98c5fcd6381774da4cfff84feea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
GetFullPathNameA
lstrcpyA
GetProcAddress
AreFileApisANSI
GetLastError
LoadLibraryA
GetModuleFileNameA
GlobalAlloc
CreateMutexA
lstrlenW
GetFileAttributesA
InterlockedDecrement
GetStartupInfoA
CreateProcessA
SetLastError
GlobalFree
ActivateActCtx
GetACP
GetOEMCP
LocalFree
VirtualProtect
OutputDebugStringA
lstrlenA
lstrcpynA
user32
GetKeyboardLayout
IsWindowVisible
GetDlgCtrlID
SetWindowTextA
SetForegroundWindow
DrawTextA
GetSystemMetrics
IsWindow
UpdateWindow
SendMessageA
GetForegroundWindow
IsZoomed
SetCapture
GetWindowRect
GetWindowTextA
TabbedTextOutA
PtInRect
GrayStringA
DefWindowProcA
EnumChildWindows
GetParent
EnableWindow
GetSystemMenu
GetDoubleClickTime
IsWindowEnabled
GetTopWindow
FillRect
OffsetRect
ReleaseCapture
SetRect
gdi32
AngleArc
AddFontMemResourceEx
RectVisible
LPtoDP
SetRectRgn
BitBlt
TextOutA
CreateFontIndirectA
DPtoLP
CreatePolygonRgn
GetTextColor
CombineRgn
Polyline
CreatePalette
CreateRectRgn
PtInRegion
GetObjectA
SetPixel
PtVisible
advapi32
LsaFreeMemory
CryptDestroyHash
LsaClose
RegCloseKey
RegOpenKeyExW
CryptDeriveKey
RegOpenKeyExA
RegDeleteValueA
RegDeleteValueW
CryptEncrypt
RegEnumValueA
CryptAcquireContextA
LsaOpenPolicy
EqualSid
CryptReleaseContext
RegEnumValueW
RegCreateKeyExA
FreeSid
RegCreateKeyExW
CryptCreateHash
CryptDestroyKey
CryptDecrypt
RegSetValueExW
RegQueryValueExW
IsTextUnicode
RegQueryValueExA
RegDeleteKeyW
RegOpenCurrentUser
RegEnumKeyW
CryptHashData
RegSetValueExA
RegOpenKeyW
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ole32
CoInitialize
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoUninitialize
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
oledlg
OleUIBusyW
msvcrt
_XcptFilter
_CIcos
_onexit
calloc
_mbscmp
__set_app_type
_initterm
_vsnprintf
??1type_info@@UAE@XZ
_controlfp
__CxxFrameHandler
?terminate@@YAXXZ
__setusermatherr
free
__p__commode
_mbsicmp
__getmainargs
_strdup
__p__fmode
_setmbcp
_except_handler3
_splitpath
_adjust_fdiv
_CxxThrowException
exit
_exit
_acmdln
__dllonexit
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ