Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8d173d569ccb80254ccadd6f7a90b280.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_8d173d569ccb80254ccadd6f7a90b280.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8d173d569ccb80254ccadd6f7a90b280
-
Size
426KB
-
MD5
8d173d569ccb80254ccadd6f7a90b280
-
SHA1
aec01ee99e4b79798e8aa0ecedeaaedd0e63b285
-
SHA256
b389b49e0a043ffdcbdcf2bb37328243e69400e752e159fc6c44c7e5693edd57
-
SHA512
0ee33f636b7c859d8d4b0e9c13d3289ddf62975ff456671075b0f59e36bc746e6f58421df39b89bf5218de3ec9efa493d2d6c174a8b1dc526b808028c9600532
-
SSDEEP
12288:SIC60D3BWPkTNSZuG7j/Wc5MkjyyKLPR6o8R0+:SIC60D3BtbGX/Wc5FjeJ6o+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_8d173d569ccb80254ccadd6f7a90b280
Files
-
VirusShare_8d173d569ccb80254ccadd6f7a90b280.exe windows:5 windows x86 arch:x86
471c067e111a9166a135819f9c23f24f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FillRect
GetClientRect
BeginPaint
DrawTextA
EndPaint
GetDlgItem
MessageBoxW
SetWindowRgn
CreateMDIWindowW
DestroyWindow
wvsprintfA
InvalidateRect
GetNextDlgGroupItem
SetWindowPlacement
HideCaret
ShowWindow
CallWindowProcW
DefWindowProcA
SendMessageA
EnableWindow
GetDC
CreateWindowExW
TranslateMessage
SetWindowLongW
PeekMessageW
MsgWaitForMultipleObjects
DispatchMessageW
CharUpperBuffW
GetShellWindow
GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
SetWindowLongA
LoadImageA
urlmon
CreateAsyncBindCtxEx
ObtainUserAgentString
CoInternetParseUrl
shell32
ShellExecuteA
SHFileOperationA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ExtractIconA
DoEnvironmentSubstW
FindExecutableW
ExtractIconW
Shell_NotifyIconW
SHGetFileInfoA
ExtractIconExA
ShellExecuteW
SHGetPathFromIDListA
ole32
CoRegisterClassObject
CoLockObjectExternal
ReleaseStgMedium
OleRegEnumVerbs
CoGetInstanceFromIStorage
advapi32
RegEnumValueA
GetSecurityDescriptorLength
RegSaveKeyA
ObjectPrivilegeAuditAlarmW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
SetThreadToken
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
AddAuditAccessObjectAce
RegCreateKeyA
MapGenericMask
InitializeSecurityDescriptor
gdi32
GetDeviceCaps
DeleteObject
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
ChoosePixelFormat
AbortPath
CombineTransform
CloseEnhMetaFile
CreateBrushIndirect
AngleArc
CreateDCW
CreateCompatibleBitmap
CheckColorsInGamut
CreateDIBPatternBrush
Arc
AddFontMemResourceEx
SetBkColor
opengl32
glColor3i
glGetLightfv
glNewList
glVertex4d
glRasterPos4fv
glColorMask
glEvalCoord2f
dbghelp
SymCleanup
UnDecorateSymbolName
SymGetModuleInfo64
SymEnumerateSymbolsW
EnumerateLoadedModules
SymEnumerateModules64
comctl32
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ord17
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
SizeofResource
SignalObjectAndWait
SetLastError
SetEvent
SetEndOfFile
ResetEvent
RemoveDirectoryW
LockResource
LoadResource
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetVersionExW
GetUserDefaultLangID
GetLocalTime
GetFullPathNameW
GetFileAttributesW
GetEnvironmentVariableW
GetDiskFreeSpaceW
GetDateFormatW
GetCPInfo
FormatMessageW
FindResourceW
EnumCalendarInfoW
FreeEnvironmentStringsW
DeleteFileW
DeleteCriticalSection
CreateProcessW
VirtualProtect
CreateEventW
CreateDirectoryW
CompareStringW
TlsSetValue
TlsGetValue
LocalAlloc
HeapCreate
InitializeCriticalSectionAndSpinCount
GetOEMCP
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
HeapAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetSystemTimeAsFileTime
SetHandleCount
GetFileType
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapFree
GetTimeZoneInformation
FreeEnvironmentStringsA
CreateFileW
GetEnvironmentStrings
GetACP
VirtualFree
VirtualAlloc
GetSystemInfo
QueryPerformanceCounter
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetModuleHandleW
GetModuleFileNameW
HeapSize
CompareStringA
SetEnvironmentVariableA
EnterCriticalSection
FindFirstFileA
GetCommandLineW
FindFirstFileW
UnhandledExceptionFilter
RtlUnwind
VirtualAllocEx
OpenProcess
GetCurrentProcessId
OpenWaitableTimerA
EnumCalendarInfoA
GetNumberFormatA
GetEnvironmentStringsW
GetLocaleInfoW
GetTempPathA
DeleteFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
GetVersion
GetSystemDirectoryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
LoadLibraryA
SetErrorMode
GetCommandLineA
SetFileTime
GetWindowsDirectoryA
ExitProcess
CopyFileA
GetCurrentProcess
GetModuleFileNameA
GetFileSize
GetTickCount
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
GetStdHandle
RaiseException
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shrink Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ