Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_3fddbe5ea820221c9214f0eff882d51e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_3fddbe5ea820221c9214f0eff882d51e.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_3fddbe5ea820221c9214f0eff882d51e
-
Size
191KB
-
MD5
3fddbe5ea820221c9214f0eff882d51e
-
SHA1
7a10e067a0e54c33a2dd6e3b58596c37db4b1162
-
SHA256
e2820a62b1f3042662a1c7cb4bc5e3d0827d0716ac9d5f18ba167a0bbf349687
-
SHA512
601fba67a1f5b6dd8f159d455788ad19921a4bd68032eb6c81ef50deef680c512e756e065dae2e05aa579a7a7bd8869d37a3a99cff32d3dfbeb66fe19e34bd67
-
SSDEEP
3072:9h7bgZG/9u966OmSZ9EQO7serHcakFswmE+Pr0FIeCHOWJLZ+:9hfgYQ96TmWNe4akFy9rClCuW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_3fddbe5ea820221c9214f0eff882d51e
Files
-
VirusShare_3fddbe5ea820221c9214f0eff882d51e.exe windows:5 windows x86 arch:x86
cec6b8a072b567a6e9e08a866c3d35e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
lstrlenW
MultiByteToWideChar
AreFileApisANSI
GetModuleHandleA
FreeLibrary
InterlockedDecrement
lstrlenA
CloseHandle
CreateMutexA
SetLastError
GetFileAttributesA
LocalFree
GetProcAddress
GetModuleFileNameA
GetStartupInfoA
lstrcpynA
LoadLibraryA
CancelWaitableTimer
GetTickCount
GetProcessHeap
ActivateActCtx
GlobalFindAtomA
GetACP
OpenWaitableTimerA
OpenWaitableTimerW
GetOEMCP
GetFullPathNameA
GetCurrentThreadId
GetLastError
WideCharToMultiByte
VirtualProtect
user32
GetForegroundWindow
GetKeyboardLayout
IsWindowUnicode
GetDesktopWindow
IsWindowVisible
IsZoomed
GetDlgCtrlID
EnableWindow
UpdateWindow
SetRect
ReleaseCapture
SetCapture
wsprintfW
SendMessageA
GetWindowRect
EnumChildWindows
DefWindowProcA
GrayStringA
GetParent
PtInRect
IsWindow
FillRect
GetSystemMetrics
GetWindowTextA
GetSystemMenu
SetForegroundWindow
IsWindowEnabled
CharUpperA
GetTopWindow
SetWindowTextA
TabbedTextOutA
DrawTextA
OffsetRect
gdi32
CreatePalette
LPtoDP
CreateFontIndirectA
SetPixel
Polyline
GetTextColor
BitBlt
PtVisible
PtInRegion
TextOutA
DPtoLP
CreatePolygonRgn
SetRectRgn
CombineRgn
RectVisible
CreateRectRgn
GetObjectA
advapi32
CryptHashData
CryptAcquireContextA
CryptDestroyKey
CryptDecrypt
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyExA
FreeSid
IsTextUnicode
CryptCreateHash
LsaFreeMemory
RegCloseKey
RegSetValueExW
RegOpenCurrentUser
LsaOpenPolicy
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
RegQueryValueExW
LsaClose
CryptDestroyHash
CryptReleaseContext
EqualSid
RegDeleteValueA
CryptDeriveKey
RegEnumValueA
RegSetValueExA
RegQueryValueExA
CryptEncrypt
RegOpenKeyA
shell32
ShellExecuteA
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitialize
CLSIDFromProgID
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
oledlg
ord8
OleUIBusyW
msvcrt
_adjust_fdiv
_controlfp
_CIcos
exit
free
_vsnprintf
_strdup
_initterm
_mbscmp
__getmainargs
_splitpath
_acmdln
__dllonexit
_onexit
_except_handler3
__setusermatherr
__CxxFrameHandler
_exit
??1type_info@@UAE@XZ
_setmbcp
_mbsicmp
_CxxThrowException
_XcptFilter
?terminate@@YAXXZ
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ