Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_4c6ced051bab8ea514bb374715e6ac5a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_4c6ced051bab8ea514bb374715e6ac5a.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_4c6ced051bab8ea514bb374715e6ac5a
-
Size
155KB
-
MD5
4c6ced051bab8ea514bb374715e6ac5a
-
SHA1
61006d6fb708d503ac5f59d0640d28bf0d2c3205
-
SHA256
133cd65e03d279a7cef9e095bd63b509b62f386d3d1b2dc6601e1fe8f233a08e
-
SHA512
c6a8d9d2b0e825d1808a5d3c144a1fa0d3fbe8be7977853d571bbf4c2dcaa1dae73eac9afd49d1ef9683948cf7032b8c5eed18cfa57b0875c61ef99f3c5dd305
-
SSDEEP
3072:rsirYqOw1UbhwL0CdxoB1m71Xn/8n1K9XHCyc9pm3x:PUqOzaAU7W1uXCN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_4c6ced051bab8ea514bb374715e6ac5a
Files
-
VirusShare_4c6ced051bab8ea514bb374715e6ac5a.exe windows:5 windows x86 arch:x86
3baf1803ac74b8fe9b580420fb833515
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
CompareStringA
LeaveCriticalSection
DeleteFileW
LoadLibraryW
FindFirstFileW
SetStdHandle
EnumSystemLocalesA
OpenThread
VirtualQueryEx
FindResourceExW
GetTickCount
GetStdHandle
WideCharToMultiByte
GetOEMCP
LCMapStringW
GlobalMemoryStatus
GetModuleHandleW
SetConsoleCtrlHandler
VirtualFree
RtlUnwind
GetTimeFormatA
Process32FirstW
GetProcessHeap
ExitProcess
SystemTimeToFileTime
ProcessIdToSessionId
WritePrivateProfileStringW
SizeofResource
CreateMutexW
InterlockedDecrement
GetDateFormatA
CreateFileW
GetStartupInfoA
FindNextFileW
IsProcessorFeaturePresent
GetCurrentThreadId
FlushFileBuffers
GetCommandLineW
GetLocaleInfoA
OpenFileMappingW
SetFilePointer
GetFileType
GetTempFileNameW
GetACP
CloseHandle
MoveFileExW
Process32NextW
DeleteCriticalSection
MultiByteToWideChar
LoadLibraryExW
QueryPerformanceCounter
RemoveDirectoryW
ExpandEnvironmentStringsW
SetHandleCount
GetProcAddress
TerminateProcess
GetLocaleInfoW
GetStartupInfoW
TlsFree
SetUnhandledExceptionFilter
GetVolumeInformationW
WriteFile
HeapReAlloc
GetPrivateProfileSectionW
HeapSize
FlushInstructionCache
CreateEventW
GetPrivateProfileSectionNamesW
GetVersionExW
SetLastError
LoadResource
LCMapStringA
GetCPInfo
GetSystemTimeAsFileTime
GetEnvironmentStringsW
DeviceIoControl
MapViewOfFile
InterlockedIncrement
EnterCriticalSection
GetDiskFreeSpaceExW
CreateFileA
TlsGetValue
ReadFile
GetFileAttributesW
GetCurrentProcess
IsValidCodePage
GetCurrentThread
RaiseException
FatalAppExitA
LoadLibraryA
lstrlenA
GetUserDefaultLCID
GetDriveTypeW
SetEnvironmentVariableA
LocalFree
HeapCreate
GetPrivateProfileStringW
UnmapViewOfFile
HeapDestroy
CancelWaitableTimer
GlobalFindAtomA
GetEnvironmentVariableA
VirtualProtectEx
OpenWaitableTimerA
OpenWaitableTimerW
AddAtomW
CancelIo
GetVersion
GlobalAddAtomW
AreFileApisANSI
lstrlenW
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
FindResourceW
SetEndOfFile
LockResource
HeapFree
GetConsoleCP
CreateThread
VirtualAlloc
InterlockedExchange
GetConsoleOutputCP
IsDebuggerPresent
GetCurrentProcessId
ReadProcessMemory
GetStringTypeW
TlsAlloc
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetTempPathW
GetModuleFileNameW
Sleep
UnhandledExceptionFilter
GetConsoleMode
CreateFileMappingW
GetTimeZoneInformation
HeapAlloc
InterlockedCompareExchange
GetStringTypeA
WaitForSingleObject
IsValidLocale
lstrcmpiW
GetPrivateProfileIntW
WriteConsoleA
CreateToolhelp32Snapshot
CompareStringW
SetEvent
FreeEnvironmentStringsW
TlsSetValue
GetFileSize
ExitThread
GetLocalTime
FreeLibrary
Module32FirstW
CreateDirectoryW
GetLogicalDrives
OpenProcess
GetFileSizeEx
WriteConsoleW
Module32NextW
user32
LoadStringW
PostQuitMessage
GetMonitorInfoW
DrawTextW
DispatchMessageW
GetCursorPos
LoadStringA
KillTimer
GetMenuItemCount
SetWindowTextW
CharNextW
EnumChildWindows
ShowWindow
SetFocus
TranslateMessage
SetWindowPos
MessageBeep
SetTimer
ReleaseDC
SetCursor
LoadImageW
MonitorFromPoint
PtInRect
ScreenToClient
GetFocus
GetMenuItemInfoW
GetWindowTextW
GetWindow
UpdateLayeredWindow
AppendMenuW
SendMessageW
RemoveMenu
TrackMouseEvent
GetWindowDC
CallWindowProcW
DestroyCursor
EnumWindows
TranslateAcceleratorW
UnregisterClassA
GetWindowRect
CreatePopupMenu
GetParent
GetClientRect
PostMessageW
MonitorFromWindow
LoadCursorW
GetMessageW
GetWindowThreadProcessId
SetForegroundWindow
LoadIconA
CharUpperA
IsWindowEnabled
wsprintfW
GetForegroundWindow
IsWindowUnicode
GetDesktopWindow
IsWindowVisible
TrackPopupMenuEx
GetWindowLongW
GetClassNameW
DestroyMenu
InvalidateRect
IsWindow
LoadMenuW
PeekMessageW
SetWindowLongW
DefWindowProcW
MapWindowPoints
gdi32
SaveDC
GetBitmapBits
RestoreDC
DeleteDC
CreateFontW
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
CreateCompatibleDC
SelectObject
SetTextColor
SetBkMode
SetBitmapBits
advapi32
CreateProcessAsUserW
RegDeleteValueW
RegOpenKeyW
AllocateAndInitializeSid
OpenProcessToken
GetNamedSecurityInfoW
RegCloseKey
RegSetValueExW
FreeSid
DeleteService
SetTokenInformation
ControlService
OpenSCManagerW
RegEnumValueW
RegQueryInfoKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
RegQueryValueExW
CreateServiceW
RevertToSelf
SetEntriesInAclW
OpenServiceW
RegCreateKeyExW
QueryServiceStatus
StartServiceW
RegOpenKeyExW
CloseServiceHandle
RegEnumKeyExW
DuplicateTokenEx
SetNamedSecurityInfoW
shell32
SHFileOperationW
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoSetProxyBlanket
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
SysStringLen
GetErrorInfo
VariantClear
SysFreeString
SetErrorInfo
VariantInit
SysAllocStringByteLen
CreateErrorInfo
SysAllocString
VariantChangeType
VarUI4FromStr
winhttp
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpSetOption
WinHttpQueryHeaders
WinHttpReadData
WinHttpSendRequest
WinHttpOpenRequest
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
StrStrIW
PathAppendW
PathIsDirectoryW
PathRemoveExtensionW
PathFileExistsW
SHDeleteKeyW
PathFindFileNameW
PathGetDriveNumberW
PathStripPathW
PathRemoveFileSpecW
msimg32
AlphaBlend
GradientFill
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
iphlpapi
GetIpForwardTable
oledlg
ord8
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
psapi
QueryWorkingSet
GetModuleInformation
GetProcessMemoryInfo
GetModuleFileNameExW
msvcrt
exit
_CIsin
_except_handler3
__set_app_type
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ