Y:\obtain\Leisure\negatively\creat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6f8987e28fed878d08858a943e7c6e7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_6f8987e28fed878d08858a943e7c6e7c.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_6f8987e28fed878d08858a943e7c6e7c
-
Size
177KB
-
MD5
6f8987e28fed878d08858a943e7c6e7c
-
SHA1
1fb1d7408e99195e23a71f49ce31bc90041dd4ee
-
SHA256
03e3cc01a263edb9aefb411ebf2efb74d2130651400dc3baaa5e344ff1ec47ad
-
SHA512
e42427a6603379938ba40cc7d0b1608458a9d3f22af6811b291b3e6e5fb2cc28cd991b54f106cb8a5f661adb69817d55f54c5b1f557a7c8cc6f74ba7906f6f36
-
SSDEEP
3072:l4k3pHqF6aRVtp0MgGaEwASYJrUb3M60P+x0HmbEVLLSLfmo0h7yDb7fCXcBkbCs:ppg6Abp0MgGaErlJSBEVaLOJZo/NuK7e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_6f8987e28fed878d08858a943e7c6e7c
Files
-
VirusShare_6f8987e28fed878d08858a943e7c6e7c.exe windows:5 windows x86 arch:x86
343433e3eafcda601a9b3a8252d28b89
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
GetStdHandle
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
SetConsoleCursorPosition
GetComputerNameA
GetSystemDirectoryA
GetWindowsDirectoryA
ExpandEnvironmentStringsA
LoadLibraryW
GetProcAddress
HeapAlloc
WideCharToMultiByte
GetModuleHandleA
InterlockedExchange
IsDebuggerPresent
user32
SetTimer
InvalidateRect
GetDC
RegisterClassA
GetSysColor
SetCursor
UnionRect
PostQuitMessage
InsertMenuItemA
GetCursorPos
SetRect
EnableMenuItem
KillTimer
UnhookWindowsHookEx
GetWindow
BeginPaint
DrawMenuBar
LoadMenuA
GetSubMenu
GetMenu
MessageBoxW
ReleaseDC
GetClientRect
RegisterWindowMessageA
SendMessageA
RegisterClassExA
GetSysColorBrush
LoadCursorA
LoadIconA
MessageBoxA
UpdateLayeredWindow
GetTopWindow
CheckDlgButton
SetDlgItemInt
GetMessagePos
GetWindowRect
SetForegroundWindow
SetWindowPos
IsIconic
IsWindowVisible
IsWindowEnabled
InsertMenuA
CreateDialogParamA
SetWindowTextA
SetClassLongW
PostMessageA
gdi32
GdiFlush
CreateSolidBrush
DeleteObject
LineTo
CreatePen
Rectangle
SetDCPenColor
SelectObject
SetBkColor
SetTextColor
Polyline
EnumFontsA
GetStockObject
GetClipBox
CreateCompatibleDC
SaveDC
MoveToEx
DeleteDC
comdlg32
GetOpenFileNameW
GetSaveFileNameW
GetSaveFileNameA
advapi32
GetUserNameA
oleaut32
SysStringLen
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
avifil32
AVIFileRelease
AVIFileOpenA
AVIFileInit
shlwapi
PathFileExistsA
gdiplus
GdipCreateBitmapFromGraphics
GdiplusStartup
GdipDrawLine
GdipGetImageGraphicsContext
GdipCreateFromHDC
GdipDisposeImage
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
msi
ord46
msvcr90
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_lock
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
??2@YAPAXI@Z
malloc
strncpy
strcat
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_initterm
sprintf
printf
strcat_s
strcpy_s
memset
labs
_crt_debugger_hook
_controlfp_s
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ