Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8c8029ce098e206eb99fbdd4f1ebe3b1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_8c8029ce098e206eb99fbdd4f1ebe3b1.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_8c8029ce098e206eb99fbdd4f1ebe3b1
-
Size
162KB
-
MD5
8c8029ce098e206eb99fbdd4f1ebe3b1
-
SHA1
48cffe0fba17b6ac8c7b4a1199de151f9e97d846
-
SHA256
59f6b5e8b1829902c9b915c3c7a6f8842445e4f9508710d4bcacdb1f80fdc2ef
-
SHA512
d4e0f13be2c348943d2e1f8a9cfb27216768a2048af3d610b56e8bfd32923a13cf635e7b6395f77e1bdc9ab1ee82ea28e6b6672d5c2092895a0e3b2baee059cb
-
SSDEEP
3072:3S4Dst7k1hdUq6UtBlH74+F4Y0Yti3zeBzd3An1YgCQSPH96PHNrD5o85PPi+/23:bDcUUqrB17l9A3zeBzJAn3ClH96PHNr9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_8c8029ce098e206eb99fbdd4f1ebe3b1
Files
-
VirusShare_8c8029ce098e206eb99fbdd4f1ebe3b1.exe windows:5 windows x86 arch:x86
0bd88434df81db2b9922980f3967785b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WideCharToMultiByte
FreeLibrary
GetModuleHandleA
GetFullPathNameA
MultiByteToWideChar
lstrcpyA
GetProcAddress
AreFileApisANSI
GetLastError
LoadLibraryA
GetModuleFileNameA
GlobalAlloc
CreateMutexA
lstrlenW
GetFileAttributesA
InterlockedDecrement
GetStartupInfoA
CreateProcessA
SetLastError
GlobalFree
ActivateActCtx
GetACP
GetOEMCP
LocalFree
VirtualProtect
OutputDebugStringA
lstrlenA
lstrcpynA
user32
GetKeyboardLayout
IsWindowUnicode
GetDesktopWindow
GetDlgCtrlID
SetWindowTextA
SetForegroundWindow
DrawTextA
GetSystemMetrics
IsWindow
UpdateWindow
SendMessageA
GetForegroundWindow
IsZoomed
SetCapture
GetWindowRect
GetWindowTextA
TabbedTextOutA
PtInRect
GrayStringA
DefWindowProcA
EnumChildWindows
GetParent
EnableWindow
GetSystemMenu
GetDoubleClickTime
IsWindowEnabled
GetTopWindow
FillRect
OffsetRect
ReleaseCapture
SetRect
gdi32
AbortDoc
RectVisible
LPtoDP
SetRectRgn
BitBlt
TextOutA
CreateFontIndirectA
DPtoLP
CreatePolygonRgn
GetTextColor
CombineRgn
Polyline
CreatePalette
CreateRectRgn
PtInRegion
GetObjectA
SetPixel
PtVisible
advapi32
CryptDecrypt
CryptDestroyHash
LsaClose
RegCloseKey
RegOpenKeyExW
CryptDeriveKey
RegOpenKeyExA
RegDeleteValueA
RegDeleteValueW
CryptEncrypt
RegEnumValueA
CryptAcquireContextA
LsaOpenPolicy
EqualSid
CryptReleaseContext
RegEnumValueW
RegCreateKeyExA
FreeSid
RegCreateKeyExW
CryptCreateHash
CryptDestroyKey
RegSetValueExW
LsaFreeMemory
RegQueryValueExW
IsTextUnicode
RegQueryValueExA
RegDeleteKeyW
RegOpenCurrentUser
RegEnumKeyW
CryptHashData
RegSetValueExA
RegOpenKeyW
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ole32
CoInitialize
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoUninitialize
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
oledlg
OleUIBusyW
msvcrt
_XcptFilter
_CIcos
_onexit
calloc
_mbscmp
__set_app_type
_initterm
_vsnprintf
??1type_info@@UAE@XZ
_controlfp
__CxxFrameHandler
?terminate@@YAXXZ
__setusermatherr
free
__p__commode
_mbsicmp
__getmainargs
_strdup
__p__fmode
_setmbcp
_except_handler3
_splitpath
_adjust_fdiv
_CxxThrowException
exit
_exit
_acmdln
__dllonexit
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ