Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_5ef9cff61795536ff04b122aa758d233.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_5ef9cff61795536ff04b122aa758d233.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_5ef9cff61795536ff04b122aa758d233
-
Size
186KB
-
MD5
5ef9cff61795536ff04b122aa758d233
-
SHA1
e2a611cabfc2cdd238ffcdee35bf7864a1994bde
-
SHA256
bba3e98354d122c35d42f5679038f149cd191ba90172cf0fe4313b5cdeec12a4
-
SHA512
253dfbd7adc830e32a23b63019ce43e03b5dc913d8c09b29d6f623fdedf7e6ae65e1439bd86c96de86894c394c6c742e57930d81b3612ad81b4ba780e5124371
-
SSDEEP
3072:BYf1WPFwUh0Rg3AGMGtXdrNa39LCEVhNbHwwHJV81vCFzopx6:BY9m7h0R1GtBwvRLwwj81vCCp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_5ef9cff61795536ff04b122aa758d233
Files
-
VirusShare_5ef9cff61795536ff04b122aa758d233.exe windows:5 windows x86 arch:x86
c127fab76d595cafed44f487321bb676
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetLastError
OutputDebugStringA
GetModuleFileNameA
GetFullPathNameA
CreateProcessA
lstrcpyA
SetLastError
CreateMutexA
lstrlenW
FreeLibrary
InterlockedDecrement
lstrlenA
LocalFree
AreFileApisANSI
MultiByteToWideChar
GetStartupInfoA
GetProcAddress
ExitProcess
CancelWaitableTimer
GetTickCount
ActivateActCtx
GlobalFindAtomA
GetACP
OpenWaitableTimerW
GetOEMCP
GetCurrentThreadId
lstrcpynA
VirtualProtect
GetFileAttributesA
WideCharToMultiByte
LoadLibraryA
GetModuleHandleA
CancelIo
user32
IsWindowUnicode
GetDesktopWindow
IsWindowVisible
EnableWindow
PtInRect
GetWindowRect
GetSystemMenu
GetSystemMetrics
ReleaseCapture
SetCapture
SetForegroundWindow
GetForegroundWindow
SendMessageA
GetDlgCtrlID
FillRect
GetParent
DrawTextA
EnumChildWindows
IsZoomed
GetWindowTextA
GrayStringA
DefWindowProcA
SetWindowTextA
UpdateWindow
wsprintfW
GetTopWindow
OffsetRect
TabbedTextOutA
SetRect
IsWindow
gdi32
TextOutA
LPtoDP
PtVisible
Polyline
CombineRgn
SetPixel
CreateRectRgn
RectVisible
BitBlt
DPtoLP
GetObjectA
CreatePalette
GetTextColor
PtInRegion
SetRectRgn
CreatePolygonRgn
CreateFontIndirectA
advapi32
RegCloseKey
CryptDestroyHash
RegEnumKeyW
RegOpenKeyExW
LsaClose
EqualSid
CryptReleaseContext
LsaOpenPolicy
RegSetValueExW
CryptCreateHash
IsTextUnicode
RegCreateKeyExA
RegOpenCurrentUser
FreeSid
CryptDestroyKey
CryptAcquireContextA
RegDeleteValueW
CryptEncrypt
RegEnumValueA
RegQueryValueExA
RegSetValueExA
CryptDecrypt
CryptDeriveKey
RegDeleteValueA
RegOpenKeyExA
CryptHashData
LsaFreeMemory
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyA
shell32
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
ole32
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CoUninitialize
StringFromCLSID
CoInitialize
comctl32
InitCommonControlsEx
_TrackMouseEvent
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
oledlg
OleUIBusyW
msvcrt
__getmainargs
_CIcos
__p__fmode
__set_app_type
__setusermatherr
__p__commode
_splitpath
exit
_strdup
_onexit
_initterm
_exit
_XcptFilter
free
_setmbcp
_controlfp
_except_handler3
_CxxThrowException
_mbsicmp
_acmdln
_vsnprintf
__CxxFrameHandler
?terminate@@YAXXZ
__dllonexit
??1type_info@@UAE@XZ
_mbscmp
_adjust_fdiv
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ