Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_27939845a0224662d55726ed9afcba9f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_27939845a0224662d55726ed9afcba9f.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_27939845a0224662d55726ed9afcba9f
-
Size
308KB
-
MD5
27939845a0224662d55726ed9afcba9f
-
SHA1
6e9fce7e119fa65f13dafc8d703b7932d40de182
-
SHA256
d54b80587c1ffb8e51f1e6224b0337d63de94fc203563778cb152a39160e4961
-
SHA512
f88db4c7dc167367e518702eabdd9045367b3564e904102b15e0ed2267ea4dbbc7c2ee1dfe4b0bdb5689f4bdbbc8c91234a0bc4d215a1a975c9d908faf307866
-
SSDEEP
6144:g55DCnHR2Y3DsPHs1oF8IAUIhAtULm+HgwZEjKPlFTCx:g5pC8k1oFLAUIhAtULHAwZ38
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_27939845a0224662d55726ed9afcba9f
Files
-
VirusShare_27939845a0224662d55726ed9afcba9f.exe windows:5 windows x86 arch:x86
bac955a3525d44e6a65595e6135c06ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CharPrevA
MessageBoxA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
TrackPopupMenu
WaitForInputIdle
GetProcessDefaultLayout
RegisterHotKey
DialogBoxParamA
GetIconInfo
EmptyClipboard
DrawIconEx
EndMenu
EnumClipboardFormats
CopyImage
DrawFocusRect
IsWinEventHookInstalled
advapi32
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
gdi32
SelectClipRgn
SetPixel
CopyMetaFileW
OffsetWindowOrgEx
SetTextJustification
CloseFigure
SetPaletteEntries
AbortDoc
SetAbortProc
GetEnhMetaFilePixelFormat
TextOutW
GetTextFaceA
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
GetStockObject
SetBkColor
kernel32
GetEnvironmentStrings
FreeEnvironmentStringsA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FreeEnvironmentStringsW
GetCurrentThreadId
TlsFree
TlsAlloc
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetVersion
GetFileAttributesExW
CreateIoCompletionPort
GetStdHandle
SetHandleCount
MulDiv
GetModuleFileNameW
GetTempPathA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
GetSystemDirectoryA
lstrcatA
lstrlenA
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
RaiseException
RtlUnwind
SetEndOfFile
GetCommandLineA
GetLastError
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateDirectoryA
CreateProcessA
FindResourceA
FormatMessageA
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetFileAttributesA
GetFullPathNameA
GetLocaleInfoA
GetModuleFileNameA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
IsDBCSLeadByte
LoadLibraryA
LoadResource
LockResource
RemoveDirectoryA
SetErrorMode
SetLastError
SizeofResource
Sleep
VirtualProtect
VirtualQuery
HeapReAlloc
HeapAlloc
GetStartupInfoA
HeapCreate
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
sdfvsczx Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text5 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
atoi Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
exit Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
atexit Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cctype Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ