Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_719f53348451602d5c45cb0af753212f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_719f53348451602d5c45cb0af753212f.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_719f53348451602d5c45cb0af753212f
-
Size
270KB
-
MD5
719f53348451602d5c45cb0af753212f
-
SHA1
40a3965befe1e3b7ee2f026fa93de3577a264a14
-
SHA256
56377a1ee2d85a68d40fde562f072f7e7edf3064480a61419d2484c6f90d498e
-
SHA512
5f94993bb813065524ff0682e188c86e3f6446c34d46ce01038386aca56b891375286af13df1888a7303469306a82c4580907f008ed8c5d3d70bf717106045a9
-
SSDEEP
3072:JKQKNbK5ybQUhN1tvAZGTT9JrewiSito1Ry:IBw5aQUhNsQHeoOE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_719f53348451602d5c45cb0af753212f
Files
-
VirusShare_719f53348451602d5c45cb0af753212f.exe windows:5 windows x86 arch:x86
32f14c100757caac373286fd7485bbad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetAtomNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetFileTime
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetShortPathNameW
GetStartupInfoA
GetStartupInfoW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InterlockedDecrement
InterlockedExchange
FindResourceW
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
FormatMessageW
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
SetCurrentDirectoryW
SetProcessWorkingSetSize
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WriteFile
lstrcatW
lstrcpynW
lstrlenW
VirtualAllocEx
GetACP
GetProcAddress
GetCurrentThread
CreateFileA
FindNextFileW
FindFirstFileW
FindClose
FindAtomW
EnterCriticalSection
DeleteFileW
DeleteAtom
CreateSemaphoreW
CreateFileW
CreateDirectoryW
LockResource
FlushInstructionCache
CompareStringW
CloseHandle
InterlockedExchangeAdd
AddAtomW
user32
LoadCursorA
SetForegroundWindow
SetFocus
LoadIconW
LoadStringW
FindWindowW
ExitWindowsEx
LoadIconA
MessageBoxW
gdi32
GetStockObject
advapi32
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyW
RegDeleteValueW
RegFlushKey
RegOpenKeyExA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
OpenProcessToken
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
msvcrt
_XcptFilter
__getmainargs
__lconv_init
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_mbschr
_mbsinc
_mbslen
_mbsrchr
_stricmp
_strnicmp
_wcsicmp
atoi
exit
free
isdigit
isleadbyte
isspace
memmove
rand
setlocale
srand
strchr
strncmp
strncpy
strrchr
strtoul
time
towlower
wcsncpy
Sections
192 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data18 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data16 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data11 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data10 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data9 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data8 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
191 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
19 Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
18 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
17 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
16 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
15 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ