Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0ec38da2a7f3e2000e67e28318004f0e.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_0ec38da2a7f3e2000e67e28318004f0e.dll
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_0ec38da2a7f3e2000e67e28318004f0e
-
Size
189KB
-
MD5
0ec38da2a7f3e2000e67e28318004f0e
-
SHA1
5e9b872e8a0350dbb1d6ababe06fab9d740de171
-
SHA256
87c455e740692b3b9e1145bb2de331c091e58398474208066141c811abac7f19
-
SHA512
801cdbcabab7c5d711aaa0ab5b74f7c124f21d0021e583cf59863a52265bed1465e3c929612c66cebcbc7ee513b4129cd326d2b174a41de55f1c49980200e186
-
SSDEEP
3072:gQXC97z4195epaT2XLNGOCiW5b55DDl3bie/t85jhiD:gQSkkpaaXjCi8die//
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_0ec38da2a7f3e2000e67e28318004f0e
Files
-
VirusShare_0ec38da2a7f3e2000e67e28318004f0e.dll windows:5 windows x86 arch:x86
f2ef7c2cf2aeae09ebf05a557f868d5a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemDirectoryW
lstrcatW
CreateFileW
GetModuleHandleA
GetProcAddress
SetFilePointer
lstrlenA
WriteFile
GetTempPathA
lstrcatA
CreateFileA
CloseHandle
user32
IsWindowEnabled
KillTimer
LoadCursorW
LoadIconW
LoadStringW
MapWindowPoints
MoveWindow
PostMessageW
PostQuitMessage
PtInRect
RegisterClassW
IsDialogMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetCapture
SetDlgItemTextW
SetFocus
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongW
SetWindowTextW
ShowCursor
ShowWindow
TranslateMessage
UnregisterClassW
UpdateWindow
ValidateRect
WinHelpW
WindowFromPoint
wsprintfW
InvalidateRect
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowLongW
GetWindowDC
GetUpdateRect
GetSystemMetrics
GetSysColor
GetScrollInfo
GetParent
GetMessageW
GetMessageTime
GetMessagePos
GetKeyboardLayout
GetFocus
GetDlgItemTextW
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameW
GetAsyncKeyState
FillRect
EnumChildWindows
EndPaint
EnableWindow
DrawFocusRect
DispatchMessageW
DestroyWindow
DefWindowProcW
DefDlgProcW
CreateWindowExW
CreateDialogParamW
ClientToScreen
CallWindowProcW
BeginPaint
RegisterClipboardFormatW
gdi32
CreateSolidBrush
DeleteDC
CreatePen
EnumFontFamiliesExW
ExtTextOutW
GetCharWidth32W
CreateFontW
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
UnrealizeObject
TranslateCharsetInfo
TextOutW
SetTextColor
SetTextAlign
SetBkMode
SetBkColor
SelectObject
PatBlt
MoveToEx
LineTo
GetTextMetricsW
GetTextExtentPointW
GetTextExtentPoint32W
GetTextAlign
GetStockObject
GetObjectW
GetFontData
GetDeviceCaps
BitBlt
advapi32
RegCloseKey
RegEnumValueW
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyW
ole32
DoDragDrop
OleInitialize
OleUninitialize
CoGetMalloc
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 476B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ