Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0ea5c64807e3fee79cd7a5dcbe74aca3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_0ea5c64807e3fee79cd7a5dcbe74aca3.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_0ea5c64807e3fee79cd7a5dcbe74aca3
-
Size
165KB
-
MD5
0ea5c64807e3fee79cd7a5dcbe74aca3
-
SHA1
81dc96f1f404c6aededa48c477b0c0767fb7dc88
-
SHA256
04f92830dedc32f722f8f64c7bfcfe913dded95df14a17fcd14353c20605833d
-
SHA512
7ee433ef997fcd66fef12bd1d79cb7b8df327e58c1f0baebd2296387fe57735198e735c8c42227ee85879e9944aa6e4fc9b49ac0168990dc877ae3b78c83330d
-
SSDEEP
3072:oU2IuWiERvcgR/5JCjfW88XeLTZBl7NnnaFf0HlBbUv:RyERcwDCK6LTvFD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_0ea5c64807e3fee79cd7a5dcbe74aca3
Files
-
VirusShare_0ea5c64807e3fee79cd7a5dcbe74aca3.exe windows:5 windows x86 arch:x86
fc08a479e6a1558a414bb47bff12f378
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
CompareStringA
LeaveCriticalSection
DeleteFileW
LoadLibraryW
FindFirstFileW
SetStdHandle
EnumSystemLocalesA
OpenThread
VirtualQueryEx
FindResourceExW
GetTickCount
GetStdHandle
WideCharToMultiByte
GetOEMCP
LCMapStringW
GlobalMemoryStatus
GetModuleHandleW
SetConsoleCtrlHandler
VirtualFree
RtlUnwind
GetTimeFormatA
Process32FirstW
GetProcessHeap
ExitProcess
SystemTimeToFileTime
ProcessIdToSessionId
WritePrivateProfileStringW
SizeofResource
CreateMutexW
InterlockedDecrement
GetDateFormatA
CreateFileW
GetStartupInfoA
FindNextFileW
IsProcessorFeaturePresent
GetCurrentThreadId
FlushFileBuffers
GetCommandLineW
GetLocaleInfoA
OpenFileMappingW
SetFilePointer
GetFileType
GetTempFileNameW
GetACP
CloseHandle
MoveFileExW
Process32NextW
DeleteCriticalSection
MultiByteToWideChar
LoadLibraryExW
QueryPerformanceCounter
RemoveDirectoryW
ExpandEnvironmentStringsW
SetHandleCount
GetProcAddress
TerminateProcess
GetLocaleInfoW
GetStartupInfoW
TlsFree
SetUnhandledExceptionFilter
GetVolumeInformationW
WriteFile
HeapReAlloc
GetPrivateProfileSectionW
HeapSize
FlushInstructionCache
CreateEventW
GetPrivateProfileSectionNamesW
GetVersionExW
SetLastError
LoadResource
LCMapStringA
GetCPInfo
GetSystemTimeAsFileTime
GetEnvironmentStringsW
DeviceIoControl
MapViewOfFile
InterlockedIncrement
EnterCriticalSection
GetDiskFreeSpaceExW
CreateFileA
TlsGetValue
ReadFile
GetFileAttributesW
GetCurrentProcess
IsValidCodePage
GetCurrentThread
RaiseException
FatalAppExitA
LoadLibraryA
lstrlenA
GetUserDefaultLCID
GetDriveTypeW
SetEnvironmentVariableA
LocalFree
HeapCreate
GetPrivateProfileStringW
UnmapViewOfFile
HeapDestroy
GetEnvironmentVariableW
GlobalAddAtomA
VirtualProtectEx
OpenWaitableTimerA
OpenWaitableTimerW
AddAtomW
CancelIo
LoadLibraryExA
GetVersion
GlobalAddAtomW
AreFileApisANSI
lstrlenW
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
FindResourceW
SetEndOfFile
LockResource
HeapFree
GetConsoleCP
CreateThread
VirtualAlloc
InterlockedExchange
GetConsoleOutputCP
IsDebuggerPresent
GetCurrentProcessId
ReadProcessMemory
GetStringTypeW
TlsAlloc
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetTempPathW
GetModuleFileNameW
Sleep
UnhandledExceptionFilter
GetConsoleMode
CreateFileMappingW
GetTimeZoneInformation
HeapAlloc
InterlockedCompareExchange
GetStringTypeA
WaitForSingleObject
IsValidLocale
lstrcmpiW
GetPrivateProfileIntW
WriteConsoleA
CreateToolhelp32Snapshot
CompareStringW
SetEvent
FreeEnvironmentStringsW
TlsSetValue
GetFileSize
ExitThread
GetLocalTime
FreeLibrary
Module32FirstW
CreateDirectoryW
GetLogicalDrives
OpenProcess
GetFileSizeEx
WriteConsoleW
Module32NextW
user32
DrawTextW
DispatchMessageW
GetCursorPos
LoadStringA
KillTimer
GetMenuItemCount
SetWindowTextW
CharNextW
EnumChildWindows
ShowWindow
SetFocus
TranslateMessage
SetWindowPos
DefWindowProcW
SetTimer
GetMonitorInfoW
SetCursor
LoadImageW
MonitorFromPoint
PtInRect
ScreenToClient
GetFocus
GetMenuItemInfoW
GetWindowTextW
GetWindow
UpdateLayeredWindow
AppendMenuW
PostQuitMessage
LoadStringW
MessageBeep
SendMessageW
RemoveMenu
TrackMouseEvent
GetWindowDC
CallWindowProcW
DestroyCursor
UnregisterClassA
GetWindowRect
EnumWindows
TranslateAcceleratorW
CreatePopupMenu
GetParent
GetClientRect
PostMessageW
MonitorFromWindow
LoadCursorW
GetMessageW
GetWindowThreadProcessId
SetForegroundWindow
LoadIconA
CharUpperA
wsprintfW
GetForegroundWindow
GetDesktopWindow
IsWindowVisible
TrackPopupMenuEx
GetWindowLongW
GetClassNameW
DestroyMenu
InvalidateRect
IsWindow
LoadMenuW
PeekMessageW
SetWindowLongW
ReleaseDC
MapWindowPoints
gdi32
SaveDC
GetBitmapBits
RestoreDC
DeleteDC
CreateFontW
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
CreateCompatibleDC
SelectObject
SetTextColor
SetBkMode
SetBitmapBits
advapi32
CreateProcessAsUserW
RegDeleteValueW
RegOpenKeyW
AllocateAndInitializeSid
OpenProcessToken
GetNamedSecurityInfoW
RegCloseKey
RegSetValueExW
FreeSid
DeleteService
SetTokenInformation
ControlService
OpenSCManagerW
RegEnumValueW
RegQueryInfoKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
RegQueryValueExW
CreateServiceW
RevertToSelf
SetEntriesInAclW
OpenServiceW
RegCreateKeyExW
QueryServiceStatus
StartServiceW
RegOpenKeyExW
CloseServiceHandle
RegEnumKeyExW
DuplicateTokenEx
SetNamedSecurityInfoW
shell32
SHGetMalloc
SHFileOperationW
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoSetProxyBlanket
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringByteLen
SetErrorInfo
VariantInit
VariantClear
SysFreeString
VarUI4FromStr
SysStringLen
GetErrorInfo
SysAllocString
VariantChangeType
CreateErrorInfo
winhttp
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpSetOption
WinHttpQueryHeaders
WinHttpReadData
WinHttpSendRequest
WinHttpOpenRequest
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
StrStrIW
PathAppendW
PathIsDirectoryW
PathRemoveExtensionW
PathFileExistsW
SHDeleteKeyW
PathFindFileNameW
PathGetDriveNumberW
PathStripPathW
PathRemoveFileSpecW
msimg32
AlphaBlend
GradientFill
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
iphlpapi
GetIpForwardTable
oledlg
ord8
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
psapi
QueryWorkingSet
GetModuleInformation
GetProcessMemoryInfo
GetModuleFileNameExW
msvcrt
exit
_CIsin
_except_handler3
__set_app_type
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ