Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_32e2c73ed8da34d87c64267936e632cb.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_32e2c73ed8da34d87c64267936e632cb.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_32e2c73ed8da34d87c64267936e632cb
-
Size
162KB
-
MD5
32e2c73ed8da34d87c64267936e632cb
-
SHA1
9f06ae399fc6280e97042c88c3a386d0db3798cb
-
SHA256
d4dc820457bbc557b14ec0e58358646afbba70f4d5cab2276cdac8ce631a3854
-
SHA512
ca7cceaba5a33714c9a9497bb065a60d2035660bd465c1e4026be4e18945064fba8b483f2ac0e47bbc001052b486704bcde69a76c53299096919def2e67804c5
-
SSDEEP
3072:wYeRK21qDSdxcAiJoV2w/BlHAYYaAVAXv43zeBzd3An1YgCQSPH96PHNrD5o85PW:w5RD1mPXKBO9pA/43zeBzJAn3ClH96Pr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_32e2c73ed8da34d87c64267936e632cb
Files
-
VirusShare_32e2c73ed8da34d87c64267936e632cb.exe windows:5 windows x86 arch:x86
46738481a5739dd3d4e669007f0ab072
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
CloseHandle
WideCharToMultiByte
lstrcpyA
GetProcAddress
AreFileApisANSI
GetLastError
LoadLibraryA
GetModuleFileNameA
GlobalAlloc
CreateMutexA
lstrlenW
GetFileAttributesA
InterlockedDecrement
GetStartupInfoA
CreateProcessA
SetLastError
GlobalFree
GetCurrentProcess
ActivateActCtx
GetACP
GetOEMCP
VirtualProtect
LocalFree
lstrcpynA
GetModuleHandleA
GetFullPathNameA
OutputDebugStringA
lstrlenA
MultiByteToWideChar
user32
SetWindowTextA
SetForegroundWindow
DrawTextA
GetSystemMetrics
IsWindow
UpdateWindow
SendMessageA
FillRect
IsZoomed
GetDlgCtrlID
GetWindowRect
GetWindowTextA
TabbedTextOutA
PtInRect
GrayStringA
DefWindowProcA
EnumChildWindows
GetParent
EnableWindow
GetSystemMenu
GetDesktopWindow
IsWindowUnicode
GetKeyboardLayout
IsWindowEnabled
GetDoubleClickTime
SetCapture
OffsetRect
ReleaseCapture
SetRect
gdi32
AbortPath
AngleArc
AddFontMemResourceEx
RectVisible
LPtoDP
SetRectRgn
BitBlt
TextOutA
CreateFontIndirectA
DPtoLP
CreatePolygonRgn
GetTextColor
CombineRgn
Polyline
CreatePalette
CreateRectRgn
PtInRegion
GetObjectA
SetPixel
PtVisible
advapi32
LsaFreeMemory
RegOpenKeyExW
RegCloseKey
RegSetValueExW
CryptDestroyHash
LsaClose
RegOpenKeyExA
RegDeleteValueA
RegDeleteValueW
CryptEncrypt
RegEnumValueA
CryptAcquireContextA
LsaOpenPolicy
EqualSid
CryptReleaseContext
RegEnumValueW
RegCreateKeyExA
FreeSid
RegCreateKeyExW
CryptCreateHash
CryptDestroyKey
CryptDecrypt
CryptDeriveKey
RegQueryValueExW
IsTextUnicode
RegQueryValueExA
RegDeleteKeyW
RegOpenCurrentUser
RegEnumKeyW
CryptHashData
RegSetValueExA
RegOpenKeyW
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ole32
CLSIDFromProgID
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
StringFromCLSID
comctl32
InitCommonControlsEx
_TrackMouseEvent
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
oledlg
OleUIBusyW
psapi
GetModuleBaseNameA
msvcrt
__set_app_type
_mbscmp
calloc
__getmainargs
_onexit
_XcptFilter
_initterm
_vsnprintf
??1type_info@@UAE@XZ
_controlfp
__CxxFrameHandler
?terminate@@YAXXZ
__setusermatherr
free
__p__commode
_mbsicmp
_CIcos
_strdup
__p__fmode
_setmbcp
_except_handler3
_splitpath
_adjust_fdiv
_CxxThrowException
exit
_exit
_acmdln
__dllonexit
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ