Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_655649852af6593d30b089b96cb66e70.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
virussign.com_655649852af6593d30b089b96cb66e70.exe
Resource
win10v2004-20240426-en
General
-
Target
virussign.com_655649852af6593d30b089b96cb66e70.vir
-
Size
75KB
-
MD5
655649852af6593d30b089b96cb66e70
-
SHA1
1ff9962950fcd314c46286dd3b258f082397d10f
-
SHA256
20aea263173081494df3c18d6986549a3f0fb82db6debdde9fdeb6025fd0c219
-
SHA512
0ddbaca26e28c992227c28930101b10516a6cb6f827a08372bd3dde9569ac0f604794896f1d3bd11de7fea97616c07668a7d82eb53540b847cb353afdde6d130
-
SSDEEP
1536:30DZwYOwmfN5GDL1Zta4mGwC6mrvSs5jBwd:3aZRODfN5GdZtLmGwxoid
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource virussign.com_655649852af6593d30b089b96cb66e70.vir
Files
-
virussign.com_655649852af6593d30b089b96cb66e70.vir.exe windows:5 windows x86 arch:x86
3eba27a98fcd98ce3e57738faba6ff78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord16
ord21
ord18
ord57
ord23
ord17
ord20
ord32
ord43
ord44
ord37
kernel32
CloseHandle
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CreateThread
CreateEventW
SetEvent
Sleep
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
HeapFree
GetProcessHeap
GetLastError
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
LocalFree
FormatMessageW
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GetModuleHandleA
GetStartupInfoW
GetVersionExA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetFilePointer
RtlUnwind
SetStdHandle
WideCharToMultiByte
FlushFileBuffers
user32
GetWindowTextW
LoadStringW
SetThreadDesktop
OpenDesktopW
GetThreadDesktop
SetProcessWindowStation
OpenWindowStationW
GetUserObjectInformationW
GetProcessWindowStation
SetForegroundWindow
EnumThreadWindows
PostMessageW
DefWindowProcW
UnregisterClassW
SetWindowLongW
GetDesktopWindow
RegisterClassW
LoadIconW
MessageBoxW
UpdateWindow
SetDlgItemTextW
ShowWindow
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
GetMessageW
DispatchMessageW
CharNextW
CreateWindowExW
DestroyWindow
PostQuitMessage
PostThreadMessageW
ntmsapi
CancelNtmsLibraryRequest
CancelNtmsOperatorRequest
OpenNtmsSessionW
SatisfyNtmsOperatorRequest
CloseNtmsSession
shell32
Shell_NotifyIconW
ole32
CoInitializeSecurity
CoInitializeEx
CoSuspendClassObjects
CoResumeClassObjects
CoUninitialize
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE