Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_9afbc4afe7d3192095fec93c1426f0d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
virussign.com_9afbc4afe7d3192095fec93c1426f0d0.exe
Resource
win10v2004-20240426-en
General
-
Target
virussign.com_9afbc4afe7d3192095fec93c1426f0d0.vir
-
Size
125KB
-
MD5
9afbc4afe7d3192095fec93c1426f0d0
-
SHA1
1d78c30c19ba6b7ac0f556003968e1c30e7b4d3e
-
SHA256
050d7184093a9b41a162fc99358c20ea75057980eb6a80999e63e6732beaf4b2
-
SHA512
e5cb1cff112f45f7b014e0d1fe9d1468a5f34f6fb9bd926cd7d2bbecc6baad7eefe2c82d014877a63e9d9a977eab2ed572312e61fa4017b87a437a9c64bdd9e5
-
SSDEEP
3072:rnnjKQlNR7Z3gcmIHv92lQBV+UdE+rECWp7hK6Cd:rOQ/R93TBV+UdvrEFp7hK7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_9afbc4afe7d3192095fec93c1426f0d0.vir
Files
-
virussign.com_9afbc4afe7d3192095fec93c1426f0d0.vir.exe windows:5 windows x86 arch:x86
38bb7ed3e55262e27c56462f354d9a45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegDeleteValueW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
kernel32
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GlobalFree
GlobalAlloc
GetSystemDirectoryW
GetModuleFileNameW
ExitProcess
SetCurrentDirectoryW
lstrcatW
lstrlenW
GetSystemDefaultLangID
GetUserDefaultLangID
FindClose
GetLastError
FindFirstFileW
FreeLibrary
GetVersionExW
GetCurrentDirectoryW
GetCommandLineW
SetLastError
OutputDebugStringW
lstrcmpiW
DeleteFileW
lstrcpyW
FindNextFileW
GetFileAttributesW
CopyFileW
CreateDirectoryW
lstrcmpW
SetFileAttributesW
lstrcmpiA
SetErrorMode
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageA
GetModuleHandleW
TerminateProcess
OpenProcess
VirtualFree
VirtualAlloc
GetModuleHandleA
GetCommandLineA
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsFree
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
GetProcessHeap
ExpandEnvironmentStringsW
CloseHandle
GetVersionExA
user32
MessageBoxA
wsprintfW
CharNextW
wvsprintfW
LoadStringA
ole32
CoTaskMemFree
StringFromIID
IIDFromString
StgOpenStorage
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
setupapi
SetupInitDefaultQueueCallback
SetupGetStringFieldW
SetupOpenInfFileW
SetupFindFirstLineW
SetupInstallFromInfSectionW
SetupCloseInfFile
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ