Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_9ab8f831e6461dc5736c711c91e537ee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_9ab8f831e6461dc5736c711c91e537ee.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_9ab8f831e6461dc5736c711c91e537ee
-
Size
160KB
-
MD5
9ab8f831e6461dc5736c711c91e537ee
-
SHA1
84e5ef9fff30bdeffff381b335f9a0d9b92901bb
-
SHA256
628dab2ec97998f6d32ec8029274603668445bd6733fb2cfec43291775cae113
-
SHA512
24dea2c69a49fbd99edf099f3c0ab155c7da5f1f3acc65e47fd1651334befc6439278600c2d52d31212d0018de35a91d75b6b68d06cff141d34268c235e85494
-
SSDEEP
3072:dSKRJ0PMe7TkhPRePx2iBriqZY13bCl4BV/snnYF3sGsC8cPz8xPC:DJe7TkhP8xxxVSmvg3sG7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_9ab8f831e6461dc5736c711c91e537ee
Files
-
VirusShare_9ab8f831e6461dc5736c711c91e537ee.exe windows:5 windows x86 arch:x86
9b8b1068a83c004692afc9aaa37ee0dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
CompareStringA
LeaveCriticalSection
DeleteFileW
LoadLibraryW
FindFirstFileW
SetStdHandle
EnumSystemLocalesA
OpenThread
VirtualQueryEx
FindResourceExW
GetTickCount
GetStdHandle
WideCharToMultiByte
GetOEMCP
LCMapStringW
GlobalMemoryStatus
GetModuleHandleW
SetConsoleCtrlHandler
VirtualFree
RtlUnwind
GetTimeFormatA
Process32FirstW
GetProcessHeap
ExitProcess
SystemTimeToFileTime
ProcessIdToSessionId
WritePrivateProfileStringW
SizeofResource
CreateMutexW
InterlockedDecrement
GetDateFormatA
CreateFileW
GetStartupInfoA
FindNextFileW
IsProcessorFeaturePresent
GetCurrentThreadId
FlushFileBuffers
GetCommandLineW
GetLocaleInfoA
OpenFileMappingW
SetFilePointer
GetFileType
GetTempFileNameW
GetACP
CloseHandle
MoveFileExW
Process32NextW
DeleteCriticalSection
MultiByteToWideChar
LoadLibraryExW
QueryPerformanceCounter
RemoveDirectoryW
ExpandEnvironmentStringsW
SetHandleCount
GetProcAddress
TerminateProcess
GetLocaleInfoW
GetStartupInfoW
TlsFree
SetUnhandledExceptionFilter
GetVolumeInformationW
WriteFile
HeapReAlloc
GetPrivateProfileSectionW
HeapSize
FlushInstructionCache
CreateEventW
GetPrivateProfileSectionNamesW
GetVersionExW
SetLastError
LoadResource
LCMapStringA
GetCPInfo
GetSystemTimeAsFileTime
GetEnvironmentStringsW
DeviceIoControl
MapViewOfFile
InterlockedIncrement
EnterCriticalSection
GetDiskFreeSpaceExW
CreateFileA
TlsGetValue
ReadFile
GetFileAttributesW
GetCurrentProcess
IsValidCodePage
GetCurrentThread
RaiseException
FatalAppExitA
LoadLibraryA
lstrlenA
GetUserDefaultLCID
GetDriveTypeW
SetEnvironmentVariableA
LocalFree
HeapCreate
GetPrivateProfileStringW
UnmapViewOfFile
HeapDestroy
GetEnvironmentVariableW
GlobalAddAtomA
CancelWaitableTimer
VirtualProtectEx
OpenWaitableTimerW
AddAtomW
CancelIo
LoadLibraryExA
GetVersion
GlobalAddAtomW
AreFileApisANSI
lstrlenW
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
FindResourceW
SetEndOfFile
LockResource
HeapFree
GetConsoleCP
CreateThread
VirtualAlloc
InterlockedExchange
GetConsoleOutputCP
IsDebuggerPresent
GetCurrentProcessId
ReadProcessMemory
GetStringTypeW
TlsAlloc
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetTempPathW
GetModuleFileNameW
Sleep
UnhandledExceptionFilter
GetConsoleMode
CreateFileMappingW
GetTimeZoneInformation
HeapAlloc
InterlockedCompareExchange
GetStringTypeA
WaitForSingleObject
IsValidLocale
lstrcmpiW
GetPrivateProfileIntW
WriteConsoleA
CreateToolhelp32Snapshot
CompareStringW
SetEvent
FreeEnvironmentStringsW
TlsSetValue
GetFileSize
ExitThread
GetLocalTime
FreeLibrary
Module32FirstW
CreateDirectoryW
GetLogicalDrives
OpenProcess
GetFileSizeEx
WriteConsoleW
Module32NextW
user32
GetMonitorInfoW
DrawTextW
DispatchMessageW
GetCursorPos
LoadStringA
KillTimer
GetMenuItemCount
SetWindowTextW
CharNextW
EnumChildWindows
ShowWindow
SetFocus
TranslateMessage
SetWindowPos
DefWindowProcW
PostQuitMessage
ReleaseDC
SetCursor
LoadImageW
MonitorFromPoint
PtInRect
ScreenToClient
GetFocus
GetMenuItemInfoW
GetWindowTextW
GetWindow
UpdateLayeredWindow
AppendMenuW
LoadStringW
MessageBeep
SendMessageW
RemoveMenu
TrackMouseEvent
GetWindowDC
CallWindowProcW
DestroyCursor
EnumWindows
UnregisterClassA
GetWindowRect
TranslateAcceleratorW
CreatePopupMenu
GetParent
GetClientRect
PostMessageW
MonitorFromWindow
LoadCursorW
GetMessageW
GetWindowThreadProcessId
LoadIconA
CharUpperA
IsWindowEnabled
wsprintfW
GetForegroundWindow
IsWindowUnicode
GetDesktopWindow
IsWindowVisible
TrackPopupMenuEx
GetWindowLongW
GetClassNameW
DestroyMenu
InvalidateRect
IsWindow
LoadMenuW
PeekMessageW
SetWindowLongW
SetTimer
MapWindowPoints
gdi32
SaveDC
GetBitmapBits
RestoreDC
DeleteDC
CreateFontW
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
CreateCompatibleDC
SelectObject
SetTextColor
SetBkMode
SetBitmapBits
advapi32
CreateProcessAsUserW
RegDeleteValueW
RegOpenKeyW
AllocateAndInitializeSid
OpenProcessToken
GetNamedSecurityInfoW
RegCloseKey
RegSetValueExW
FreeSid
DeleteService
SetTokenInformation
ControlService
OpenSCManagerW
RegEnumValueW
RegQueryInfoKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
RegQueryValueExW
CreateServiceW
RevertToSelf
SetEntriesInAclW
OpenServiceW
RegCreateKeyExW
QueryServiceStatus
StartServiceW
RegOpenKeyExW
CloseServiceHandle
RegEnumKeyExW
DuplicateTokenEx
SetNamedSecurityInfoW
shell32
SHGetMalloc
SHFileOperationW
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoSetProxyBlanket
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringByteLen
SetErrorInfo
VariantInit
VariantClear
SysFreeString
VarUI4FromStr
SysStringLen
GetErrorInfo
SysAllocString
VariantChangeType
CreateErrorInfo
winhttp
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpSetOption
WinHttpQueryHeaders
WinHttpReadData
WinHttpSendRequest
WinHttpOpenRequest
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
StrStrIW
PathAppendW
PathIsDirectoryW
PathRemoveExtensionW
PathFileExistsW
SHDeleteKeyW
PathFindFileNameW
PathGetDriveNumberW
PathStripPathW
PathRemoveFileSpecW
msimg32
AlphaBlend
GradientFill
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
iphlpapi
GetIpForwardTable
oledlg
ord8
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
psapi
QueryWorkingSet
GetModuleInformation
GetProcessMemoryInfo
GetModuleFileNameExW
msvcrt
exit
_CIsin
_except_handler3
__set_app_type
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ