In
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_7b56ce19f72c349288d55a565189726b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_7b56ce19f72c349288d55a565189726b.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_7b56ce19f72c349288d55a565189726b
-
Size
306KB
-
MD5
7b56ce19f72c349288d55a565189726b
-
SHA1
759d5ff6c10ec8b8deccd12980c0b7d11fcdc15f
-
SHA256
05223c4440912ff7cb205947ed9c4566810a7e876c9a79beb2d495d4fdbe1b23
-
SHA512
7bc34db725cd0ca84530f0a759e8a8884105a607cd0cdc456a1d99171d077ca5c03f337de5f8f621d5e63975dccad1e813ff395e379175a75d75bbbdf716a0db
-
SSDEEP
6144:QYscAKSA99k4jKmlhF5wXfq9utOgvlNQzfEiVPT6F9iFd3vaKkO:/scAvW9k4xF5wPq9SdPiV6DiFlCKJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_7b56ce19f72c349288d55a565189726b
Files
-
VirusShare_7b56ce19f72c349288d55a565189726b.exe windows:5 windows x86 arch:x86
51097d88b63ddc8b558d1b57e8443638
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
VirtualFree
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
GetFileType
GetStdHandle
SetHandleCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FlushFileBuffers
GetConsoleMode
GetCurrentProcessId
WideCharToMultiByte
WriteFile
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
GetModuleHandleW
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
ReadFile
ReadConsoleInputA
SetConsoleMode
GetModuleFileNameA
FreeLibrary
IsDebuggerPresent
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
ExitProcess
GetProcAddress
VirtualProtect
GetCurrentProcess
LoadLibraryA
FlushInstructionCache
FindFirstFileA
FindNextFileA
GetConsoleWindow
SetConsoleTitleA
OpenProcess
CreateProcessA
GetLocaleInfoA
CreateFileA
GetFullPathNameA
MultiByteToWideChar
BackupWrite
SetThreadPriority
LocalFree
HeapFree
Sleep
GetConsoleTitleA
CreateEventA
WaitForSingleObject
lstrcpyA
EnumResourceLanguagesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
LoadLibraryW
GetFileInformationByHandle
GetCurrentThreadId
lstrcpynA
GetTickCount
GetLastError
GetProcessHeap
HeapAlloc
LocalAlloc
CreatePipe
CloseHandle
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
GetConsoleCP
user32
GetDesktopWindow
SetTimer
DispatchMessageA
GetMessageA
TranslateMessage
LoadCursorA
RegisterClassExA
MessageBoxW
EnumThreadWindows
UpdateWindow
LoadIconA
ShowWindow
DefWindowProcA
PostQuitMessage
InvalidateRect
DefFrameProcA
CreateMDIWindowA
CreateWindowExA
GetSubMenu
GetMenu
FillRect
GetWindowDC
CallWindowProcA
SetWindowLongA
UnhookWindowsHookEx
MessageBeep
CallNextHookEx
MessageBoxIndirectA
SendDlgItemMessageA
MessageBoxA
GetDlgItem
EnableWindow
SetFocus
EndDialog
CreatePopupMenu
AppendMenuA
GetCursorPos
TrackPopupMenu
GetDC
ReleaseDC
SendMessageA
DestroyWindow
GetClientRect
FindWindowA
CreateIconIndirect
GetIconInfo
GetWindowTextA
SystemParametersInfoA
GetWindowRect
GetSystemMetrics
GetMenuItemCount
GetMenuItemID
ModifyMenuA
BeginPaint
EndPaint
CreateMenu
SetMenu
LoadImageA
GetSystemMenu
CheckMenuItem
SetWindowPos
GetWindowLongA
CreateWindowExW
GetParent
GetKeyState
IsWindowEnabled
gdi32
SetWindowExtEx
GetPixel
SetPixel
SetBkColor
ScaleWindowExtEx
SetMapMode
GetDeviceCaps
SetViewportExtEx
GetStockObject
CreateSolidBrush
CreateBitmap
CreatePen
SelectObject
DeleteObject
AbortDoc
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
CreateFontW
SaveDC
MoveToEx
LineTo
RestoreDC
SelectPalette
RoundRect
Ellipse
SetViewportOrgEx
Rectangle
OffsetViewportOrgEx
StartDocA
StartPage
winspool.drv
OpenPrinterA
comdlg32
GetSaveFileNameA
CommDlgExtendedError
advapi32
CloseServiceHandle
QueryServiceStatusEx
GetSecurityInfo
ConvertSidToStringSidA
RegOpenKeyExW
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExW
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetServiceObjectSecurity
ControlService
AllocateAndInitializeSid
GetLengthSid
AddAccessAllowedAce
GetAce
AddAce
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetFileSecurityA
FreeSid
RegCreateKeyExA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
EnumDependentServicesA
OpenServiceA
GetFileSecurityA
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
InitializeAcl
IsValidAcl
IsValidSecurityDescriptor
OpenSCManagerA
QueryServiceObjectSecurity
ws2_32
recv
inet_addr
send
connect
socket
closesocket
listen
WSACleanup
htons
getaddrinfo
WSAStartup
psapi
EnumProcesses
EnumProcessModules
GetProcessMemoryInfo
GetModuleFileNameExA
winscard
SCardFreeMemory
SCardDisconnect
SCardConnectA
SCardListReadersA
SCardEstablishContext
SCardControl
SCardReleaseContext
shlwapi
StrToIntExA
PathRemoveBackslashA
PathRelativePathToA
opengl32
glMatrixMode
glPushMatrix
glRotatef
glMaterialfv
glColor4fv
glBindTexture
glTranslatef
glMaterialf
glPopMatrix
glViewport
glLoadIdentity
glu32
gluPerspective
uxtheme
SetWindowTheme
Exports
Exports
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ