Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0827e2f0a5450e3398952194ae231f44.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_0827e2f0a5450e3398952194ae231f44.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_0827e2f0a5450e3398952194ae231f44
-
Size
472KB
-
MD5
0827e2f0a5450e3398952194ae231f44
-
SHA1
0cbf557a766b6438a434973569f49a5742799566
-
SHA256
44489c49b0a83eecd1bc83fb5b77e687fa08b65c41803172db8af1abc2b3884b
-
SHA512
803a5a5268079a2a652aeb0bcec503c6ad8101744bb7fc0690aad1fe132dad54bab5d636686e86530094bb669efe4a4532f7bbe69a4248ca374f05a4612b6267
-
SSDEEP
6144:/B8iFYYFywXwM1d0FkmFT1zTM6bDf0HFr3grgciKwQ7dkDRpMH4H6dd6:TF8w91d0FkmFTl1fCBIP6MH4HS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_0827e2f0a5450e3398952194ae231f44
Files
-
VirusShare_0827e2f0a5450e3398952194ae231f44.exe windows:4 windows x86 arch:x86
9f5da4a6a268fe883b6df2fe946b293d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommProperties
ConvertDefaultLocale
SetErrorMode
WTSGetActiveConsoleSessionId
GetModuleHandleA
VirtualProtect
UpdateResourceA
FreeConsole
GetLastError
ScrollConsoleScreenBufferA
GetConsoleWindow
GetConsoleScreenBufferInfo
GetStdHandle
VirtualQuery
SetFileApisToANSI
msvcrt
sprintf
printf
memcpy
iswupper
localeconv
user32
ShowWindow
FindWindowExA
clusapi
ClusterNodeControl
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 877B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ