Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561
-
Size
144KB
-
MD5
71efd5f8d2ad4c891d4d52f2cce17561
-
SHA1
f34013094d0de6756de5c4979181e1a468836454
-
SHA256
62c10c55dac6618eff4716e89de4bae41c429102fae8cae2f0ffc86a05ad82e2
-
SHA512
0f8bab954b18c6e57a3bd0b1b685a5c4d4b194ab30c4b0e8a192cf57d9343c33e7b3f2ed9cb8a815f931b702c528d01ac58f30b8bfa3921854b285cd899bd7b0
-
SSDEEP
3072:XNfr+k4XY4h+PhzjzrOdt9lES2jbxWGqe:XNf14D+PhznrOdmSbGqe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_71efd5f8d2ad4c891d4d52f2cce17561
Files
-
VirusShare_71efd5f8d2ad4c891d4d52f2cce17561.exe windows:5 windows x86 arch:x86
7fa65cf4c9eff4fb0316832c74933210
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomA
GlobalMemoryStatusEx
GlobalWire
Heap32First
Module32NextW
OpenEventW
ReadConsoleOutputCharacterW
ReleaseMutex
SetTapePosition
SetVolumeMountPointA
SignalObjectAndWait
TlsFree
Toolhelp32ReadProcessMemory
TransactNamedPipe
GetUserDefaultLCID
UnlockFile
VirtualFree
VirtualLock
WaitForSingleObject
WideCharToMultiByte
_lcreat
lstrcatW
lstrcmpA
lstrcmpW
lstrcpynA
VirtualAlloc
CreateFileA
GetStartupInfoA
GetPrivateProfileStringW
GetPrivateProfileIntW
GetLastError
GetFileInformationByHandle
GetFileAttributesExW
GetEnvironmentStringsW
GetDiskFreeSpaceW
GetCurrentProcessId
GetConsoleAliasExesLengthA
FlushConsoleInputBuffer
FindFirstVolumeMountPointA
EnumSystemLocalesW
EnumSystemLanguageGroupsA
EnumCalendarInfoA
DosDateTimeToFileTime
DisableThreadLibraryCalls
AddConsoleAliasA
CreateHardLinkA
CreateDirectoryExW
CopyFileExA
ChangeTimerQueueTimer
AssignProcessToJobObject
TransmitCommChar
user32
CheckRadioButton
CharPrevA
CascadeChildWindows
CallMsgFilter
AppendMenuW
AdjustWindowRect
CloseDesktop
DdeGetData
DefFrameProcA
DialogBoxParamA
DispatchMessageW
DragDetect
DrawFrameControl
DrawStateA
DrawStateW
DrawTextW
GetAltTabInfoA
GetClassInfoExA
GetClipboardOwner
GetClipboardSequenceNumber
GetCursorInfo
GetDlgItem
GetLastActivePopup
LoadIconA
WINNLSEnableIME
UnregisterDeviceNotification
ToAsciiEx
SystemParametersInfoW
SwitchToThisWindow
SetWindowWord
SetWindowContextHelpId
SetCursor
SetCapture
SendMessageW
SendMessageCallbackW
ReleaseDC
MoveWindow
ModifyMenuW
ModifyMenuA
MenuItemFromPoint
IsCharLowerW
InvalidateRgn
GetScrollInfo
GetShellWindow
GetSysColorBrush
GetTabbedTextExtentW
GetWindowModuleFileNameA
GrayStringA
GetScrollBarInfo
InflateRect
comdlg32
ChooseFontW
CommDlgExtendedError
FindTextA
FindTextW
GetFileTitleW
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameA
ChooseColorW
PageSetupDlgA
PageSetupDlgW
PrintDlgA
PrintDlgExA
PrintDlgExW
PrintDlgW
ReplaceTextA
ReplaceTextW
GetSaveFileNameW
GetFileTitleA
ChooseColorA
advapi32
RegOpenKeyW
shell32
SHCreateDirectoryExW
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExA
ShellExecuteA
SHQueryRecycleBinA
SHPathPrepareForWriteA
SHLoadInProc
CheckEscapesW
DoEnvironmentSubstW
DragFinish
DragQueryFile
DragQueryFileW
DragQueryPoint
ExtractAssociatedIconA
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconEx
ExtractIconExA
FindExecutableW
SHBrowseForFolder
SHBrowseForFolderA
SHBrowseForFolderW
SHIsFileAvailableOffline
SHEmptyRecycleBinA
SHEmptyRecycleBinW
SHFileOperation
SHGetDataFromIDListW
SHGetFileInfo
SHGetFolderLocation
SHGetIconOverlayIndexW
SHGetPathFromIDListA
SHGetPathFromIDListW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
WOWShellExecute
ole32
CoQueryAuthenticationServices
CoRegisterSurrogate
CoReleaseMarshalData
CoRevokeClassObject
CoSetProxyBlanket
CoUninitialize
CreateAntiMoniker
CreateDataAdviseHolder
CreateGenericComposite
GetHGlobalFromILockBytes
GetHGlobalFromStream
HBITMAP_UserFree
HBITMAP_UserMarshal
HENHMETAFILE_UserFree
HENHMETAFILE_UserMarshal
HICON_UserMarshal
HMENU_UserFree
HMETAFILE_UserMarshal
HPALETTE_UserMarshal
IsEqualGUID
OleCreateLinkToFileEx
OleCreateStaticFromData
OleIsCurrentClipboard
OleLockRunning
OleRegGetMiscStatus
OleSave
OleSaveToStream
OleSetMenuDescriptor
ProgIDFromCLSID
PropVariantCopy
ReleaseStgMedium
RevokeDragDrop
StgCreateStorageEx
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
StgOpenStorageOnILockBytes
WriteOleStg
CoGetInterfaceAndReleaseStream
CoGetCurrentLogicalThreadId
CoCreateObjectInContext
CoCreateInstance
CLIPFORMAT_UserUnmarshal
CLIPFORMAT_UserMarshal
CLIPFORMAT_UserFree
CoGetInstanceFromIStorage
shlwapi
StrChrW
StrCmpNA
StrCmpNW
StrRStrIW
StrStrA
StrStrIA
StrStrW
Sections
.text18 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text17 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text16 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text44 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text14 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text13 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text12 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text11 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text10 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text9 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text8 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text7 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1024B - Virtual size: 527B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ