Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_99d712c44429d31fc6a57f79fb662b3b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_99d712c44429d31fc6a57f79fb662b3b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_99d712c44429d31fc6a57f79fb662b3b
-
Size
173KB
-
MD5
99d712c44429d31fc6a57f79fb662b3b
-
SHA1
c40ef93804fcb4a31f7ced0ccd402f92e7db8480
-
SHA256
1efa4e9b79094d1e23d63c3caaf4c038699c508b7f063c15b8258d20ba37376d
-
SHA512
4f2755bca46efb880a9e911c4c117006289190f236521c31b8cdccb75adb8346b439b83e93b94238a616ea090858d831db4fb636d7cc40fb59f08a0e51650819
-
SSDEEP
3072:5qX5LFM4NlzCEd3TkAPFpexBjPl8BjCV64et4WfeCpi0oAnOjKD:5+PjztdD/PqBjPlIWV6Vt40eCo0PL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_99d712c44429d31fc6a57f79fb662b3b
Files
-
VirusShare_99d712c44429d31fc6a57f79fb662b3b.exe windows:4 windows x86 arch:x86
a67e20a88161922d674152f8dfb74fbe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_timezone
asctime
div
fopen
free
gmtime
malloc
mktime
realloc
sprintf
strchr
strncmp
strstr
toupper
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_Remove
ImageList_ReplaceIcon
InitCommonControlsEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreatePipe
CreateProcessA
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPriorityClass
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetVersion
GlobalAlloc
GlobalLock
GlobalUnlock
IsBadReadPtr
LoadLibraryA
MapViewOfFile
MulDiv
OpenProcess
OutputDebugStringA
ReadFile
ReadProcessMemory
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetPriorityClass
SetThreadPriority
Sleep
TerminateProcess
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualLock
VirtualProtectEx
VirtualQueryEx
VirtualUnlock
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
user32
wsprintfA
AppendMenuA
CallWindowProcA
CharLowerA
CharUpperA
CheckDlgButton
CheckMenuRadioItem
CheckRadioButton
CloseClipboard
CreatePopupMenu
DestroyCursor
DestroyIcon
DestroyMenu
DialogBoxParamA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EnumClipboardFormats
FindWindowA
GetActiveWindow
GetAsyncKeyState
GetClassInfoA
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemTextA
GetParent
GetSysColorBrush
GetWindowDC
GetWindowRect
GetWindowTextA
InvalidateRect
IsDlgButtonChecked
IsIconic
IsWindowEnabled
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
MoveWindow
OpenClipboard
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetClassLongA
SetClipboardData
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
wvsprintfA
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
SHGetFileInfoA
ShellExecuteA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 119KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE