Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_23a14d08db5657d26e7ae10956f7b68a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_23a14d08db5657d26e7ae10956f7b68a.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_23a14d08db5657d26e7ae10956f7b68a
-
Size
561KB
-
MD5
23a14d08db5657d26e7ae10956f7b68a
-
SHA1
5e86a634097d462b313f48de8b925c6c2d05ebde
-
SHA256
a4335506219e4228ebd3d4b63f766352a5bdaef80d7a0c26a17bfd3f8d8a0416
-
SHA512
68c2073c2cbb0cffdfbe8c296175cdf678ca838dfb36a344d7a6754f28c52db013c77fe90e36a746cd8f1646422f5d5524f8911c85f44ed0ec7827d00281c799
-
SSDEEP
12288:TvVCMTiZ8xpz55ELYTyWaXqrFPCV33Uoe0cq3axfZROkDAG:DVNTk8Xz55ELIAqr1g3kEcqGfHCG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_23a14d08db5657d26e7ae10956f7b68a
Files
-
VirusShare_23a14d08db5657d26e7ae10956f7b68a.exe windows:5 windows x86 arch:x86
a238a5f61b8fb928a8b2ca4aabf81837
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadBitmapA
GetSystemMetrics
ScreenToClient
LoadStringW
PostQuitMessage
CharNextExA
GetDlgItem
GetSystemMenu
CreatePopupMenu
GetClipboardData
CopyAcceleratorTableA
IsMenu
GetWindowWord
GetTopWindow
DefDlgProcW
GetOpenClipboardWindow
RegisterHotKey
IsCharAlphaW
SetScrollInfo
shell32
ShellExecuteW
DragAcceptFiles
advapi32
RegOpenKeyA
RegEnumValueA
gdi32
CreateRectRgnIndirect
SetBkMode
RestoreDC
CreateCompatibleBitmap
SetWindowOrgEx
GetCharWidthA
CreatePen
SetPixelV
SetColorSpace
GetPath
EnumICMProfilesW
GetNearestPaletteIndex
SetBrushOrgEx
SelectClipPath
EnumMetaFile
GetPaletteEntries
CreateBitmap
kernel32
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
LoadLibraryA
DeviceIoControl
SetMailslotInfo
GlobalLock
GlobalAlloc
GetModuleFileNameW
RemoveDirectoryW
GetSystemDirectoryW
GetWindowsDirectoryW
OpenSemaphoreW
GetPrivateProfileStringW
HeapAlloc
TlsSetValue
CreateRemoteThread
EnumResourceNamesW
GetPrivateProfileSectionW
DebugActiveProcessStop
GetFullPathNameA
Sleep
VirtualQueryEx
GetCurrentThread
GetModuleFileNameA
HeapDestroy
VirtualProtectEx
VirtualFree
CloseHandle
SetEndOfFile
GetTimeFormatA
SetEnvironmentVariableW
GetProcessHeap
CreateEventA
GlobalMemoryStatusEx
GetCommandLineA
GetStartupInfoA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
Sections
.text Size: 181KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ