Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0d8292c547f748ec54fa333f1c390d29.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_0d8292c547f748ec54fa333f1c390d29.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_0d8292c547f748ec54fa333f1c390d29
-
Size
359KB
-
MD5
0d8292c547f748ec54fa333f1c390d29
-
SHA1
27c38c099a4467287c979d41c63c4e3c697c3c51
-
SHA256
8169da5209591f914e9a537c15d6d5142ea7eb182fc7be7ec980f003c074a44e
-
SHA512
29daf3e642a92b04f9171446c288f75eeb861119eca0e65c1a58b069d5b1c908c343ba9f71c431c4bb02b4d7b465f2edd64a9577a08857f864cda5c94885b65e
-
SSDEEP
6144:WznsIm7ge43t1I0T96mmoK0+3L0JH2stANRgrGb6CW:Sn07ge8bIY6IRI6H2stANmrg6CW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_0d8292c547f748ec54fa333f1c390d29
Files
-
VirusShare_0d8292c547f748ec54fa333f1c390d29.exe windows:5 windows x86 arch:x86
1adb33e85adc57f78cb6cf3c3b0eb1c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharToOemA
CharToOemBuffA
CharUpperA
CopyRect
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
FindWindowExA
GetClassNameA
GetClientRect
GetDlgItem
GetDlgItemTextA
GetMessageA
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
IsWindow
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MapWindowPoints
MessageBoxA
OemToCharA
OemToCharBuffA
PeekMessageA
PostMessageA
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetMenu
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
WaitForInputIdle
wsprintfA
wvsprintfA
GetMenu
GetWindowDC
ReleaseDC
CopyImage
GetKeyState
ScreenToClient
GetWindowLongW
SetTimer
GetMessageW
DispatchMessageW
KillTimer
SendMessageW
wsprintfW
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
CreateWindowExW
SetWindowLongW
UnhookWindowsHookEx
SystemParametersInfoW
DrawTextW
GetDC
ClientToScreen
DialogBoxIndirectParamW
DrawIconEx
CallWindowProcW
DefWindowProcW
CallNextHookEx
PtInRect
SetWindowsHookExW
LoadImageW
LoadIconW
MessageBeep
EnableMenuItem
GetSystemMenu
wvsprintfW
CharUpperW
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
DrawTextA
EmptyClipboard
EndPaint
ExitWindowsEx
FillRect
GetClassInfoA
GetMessagePos
InvalidateRect
IsWindowEnabled
LoadImageA
MessageBoxIndirectA
OpenClipboard
PostQuitMessage
RegisterClassA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetForegroundWindow
SystemParametersInfoA
TrackPopupMenu
GetKeyboardType
DdeCmpStringHandles
DdeFreeStringHandle
DdeQueryStringA
DdeCreateStringHandleA
DdeGetLastError
DdeFreeDataHandle
DdeUnaccessData
DdeAccessData
DdeCreateDataHandle
DdeClientTransaction
DdeNameService
DdePostAdvise
DdeSetUserHandle
DdeQueryConvInfo
DdeDisconnect
DdeConnect
DdeUninitialize
DdeInitializeA
comdlg32
CommDlgExtendedError
GetOpenFileNameA
ChooseFontA
FindTextA
ChooseColorA
GetSaveFileNameA
shell32
SHBrowseForFolderA
SHChangeNotify
SHFileOperationA
SHGetFileInfoA
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetPathFromIDListA
SHGetSpecialFolderPathW
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteExW
ShellExecuteA
SHGetDesktopFolder
SHGetDataFromIDListA
advapi32
CheckTokenMembership
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegFlushKey
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
AllocateAndInitializeSid
FreeSid
SetFileSecurityW
SetFileSecurityA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
gdi32
SetMapMode
SetEnhMetaFileBits
SetDIBColorTable
SetBrushOrgEx
SetAbortProc
SelectPalette
SelectClipRgn
SaveDC
RoundRect
RestoreDC
Rectangle
RectVisible
RealizePalette
Polyline
PolyPolyline
PlayEnhMetaFile
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetWinMetaFileBits
GetTextMetricsA
GetTextExtentPointA
GetTextExtentPoint32A
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
GetPaletteEntries
GetObjectType
GetObjectA
SetPixel
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
GdiFlush
ExtTextOutA
ExtCreatePen
ExcludeClipRect
EndPage
EndDoc
DeleteEnhMetaFile
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgn
CreatePenIndirect
CreatePen
CreatePalette
CreateICA
CreateHalftonePalette
CreateDIBitmap
CreateDIBSection
CreateDCA
CreateBitmap
CopyEnhMetaFileA
CombineRgn
BitBlt
SetROP2
SetViewportExtEx
SetViewportOrgEx
SetWinMetaFileBits
SetWindowExtEx
SetWindowOrgEx
StartDocA
StartPage
StretchDIBits
UnrealizeObject
SetTextColor
SetBkMode
SetBkColor
CreateFontIndirectA
CreateBrushIndirect
GetObjectW
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
StretchBlt
GetCurrentObject
DeleteDC
CreateFontIndirectW
CreateCompatibleDC
DeleteObject
Polygon
GetNearestPaletteIndex
kernel32
IsBadReadPtr
GetSystemDirectoryW
GetCurrentThreadId
SuspendThread
TerminateThread
InitializeCriticalSection
ResetEvent
SetEvent
CreateEventW
GetVersionExW
GetModuleFileNameW
SetProcessWorkingSetSize
SetCurrentDirectoryW
GetDriveTypeW
GetCommandLineW
GetStartupInfoW
lstrcpyW
FormatMessageW
GetFileSize
WaitForMultipleObjects
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
CreateProcessW
CreateJobObjectW
ResumeThread
AssignProcessToJobObject
CreateIoCompletionPort
SetInformationJobObject
GetQueuedCompletionStatus
GetExitCodeProcess
SetEnvironmentVariableW
GetTempPathW
GetSystemTimeAsFileTime
lstrlenW
CompareFileTime
SetThreadLocale
RemoveDirectoryW
ExpandEnvironmentStringsW
VirtualAlloc
GlobalMemoryStatusEx
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
WaitForSingleObject
SystemTimeToFileTime
Sleep
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEnvironmentVariableA
SetEndOfFile
SetCurrentDirectoryA
ReadFile
MultiByteToWideChar
MoveFileExA
MoveFileA
LocalFileTimeToFileTime
LoadLibraryA
IsDBCSLeadByte
HeapReAlloc
HeapFree
HeapAlloc
GlobalAlloc
GetVersionExA
GetTimeFormatA
GetTickCount
GetTempPathA
GetStdHandle
GetProcessHeap
GetProcAddress
GetNumberFormatA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileType
GetFileAttributesW
GetFileAttributesA
GetDateFormatA
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
GetCPInfo
FreeLibrary
FindResourceA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
ExitProcess
DosDateTimeToFileTime
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateDirectoryW
CreateDirectoryA
CompareStringA
CloseHandle
ExitThread
SetStdHandle
GetConsoleCP
GetConsoleMode
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcessId
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
RaiseException
CompareStringW
LocalFree
lstrcpynA
lstrcmpA
lstrcatA
WritePrivateProfileStringA
SetErrorMode
SearchPathA
RemoveDirectoryA
LoadLibraryExA
GlobalUnlock
GlobalLock
GetWindowsDirectoryA
GetVersion
GetTempFileNameA
GetSystemDirectoryA
GetShortPathNameA
GetPrivateProfileStringA
GetDiskFreeSpaceA
GetStartupInfoA
GetModuleHandleW
VirtualFree
GetLocalTime
CreateThread
GetExitCodeThread
GetDiskFreeSpaceExW
lstrcatW
LockResource
LoadResource
SizeofResource
FindResourceExA
MulDiv
GlobalFree
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
lstrcmpiW
GetEnvironmentVariableW
lstrcmpW
Sections
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hp Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.prompt Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ