Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_412d0c61b2da421437bcca49ac4e7816.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_412d0c61b2da421437bcca49ac4e7816.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_412d0c61b2da421437bcca49ac4e7816
-
Size
592KB
-
MD5
412d0c61b2da421437bcca49ac4e7816
-
SHA1
75680c0941c5559ddc8aeeb6d593e6cc186e1b40
-
SHA256
d5a4fc264fa634fd52d925253a070aa52cb6eb4a5cd063ab1b9837f7445834a0
-
SHA512
21d55b9236c1f6e38c7c11b5fcfb7274a1569ac56a0947ca8003b49b8b97717274ecd77f22ed62043092f503d2608a47abe06f3b6617c7511ac2a99b91053d24
-
SSDEEP
6144:YMNSA4dBIeZZIrrmU4BYCRurheAxLEB61kEt7Vle5ahy24949+1oQRurheAxLEBR:YMNp4dBPIrvABTVEDruYM3TVED+rN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_412d0c61b2da421437bcca49ac4e7816
Files
-
VirusShare_412d0c61b2da421437bcca49ac4e7816.exe windows:4 windows x86 arch:x86
62f575efd2473d73b482dd0e455dc70e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetCaretPos
OemToCharBuffA
PeekMessageW
PtInRect
OffsetRect
TrackPopupMenuEx
CharToOemBuffA
RemoveMenu
DrawIcon
GetDlgItem
GetClassNameA
DrawTextExA
CreateCursor
GetClassLongA
GetSystemMetrics
CheckRadioButton
LoadCursorFromFileW
GetKeyNameTextW
InsertMenuW
SendDlgItemMessageA
DeferWindowPos
SetForegroundWindow
SendMessageA
LoadIconA
GetClientRect
GetMessagePos
MapVirtualKeyA
ScrollWindow
GetClassInfoA
IsWindow
GetTabbedTextExtentW
AdjustWindowRect
GrayStringW
GetMessageA
MessageBoxA
DispatchMessageW
CloseWindow
SetActiveWindow
SetCapture
KillTimer
UnhookWinEvent
SetWindowLongA
PaintDesktop
BringWindowToTop
CharUpperW
SetCaretPos
CharLowerBuffW
DrawTextW
ShowWindow
PackDDElParam
GetWindowLongA
SetFocus
SetKeyboardState
GetGUIThreadInfo
LoadCursorFromFileA
BeginDeferWindowPos
EnumChildWindows
FindWindowW
WindowFromDC
CreateDesktopW
GetScrollPos
SetMenuDefaultItem
GetWindowWord
GetSysColorBrush
PostQuitMessage
SetWindowPlacement
GetClipboardFormatNameW
SendInput
GetWindowRect
PostThreadMessageA
MoveWindow
DrawIconEx
GetMenuItemID
InSendMessage
GetMenuItemRect
RemovePropA
GetNextDlgTabItem
CloseClipboard
ReplyMessage
CharPrevA
LoadImageA
EnableWindow
SetWindowTextA
DrawTextA
SetCaretBlinkTime
SetMenuItemInfoA
DefFrameProcW
IsWindowVisible
CharPrevW
MapWindowPoints
DdeCreateStringHandleW
LoadMenuW
IsCharAlphaW
DdeQueryStringA
CreateIconFromResource
GetDlgItemTextW
MessageBoxIndirectA
SetWindowTextW
keybd_event
MessageBeep
IsIconic
ReuseDDElParam
GetWindowTextA
GetMessageExtraInfo
GetProcessWindowStation
DestroyCursor
OpenClipboard
OemToCharA
LoadCursorW
SendDlgItemMessageW
AttachThreadInput
GetKeyboardLayout
EnumClipboardFormats
GetDlgItemInt
GetClassInfoW
ModifyMenuA
EnumWindows
LoadCursorA
TranslateAcceleratorA
IsCharAlphaNumericA
CreateDialogParamA
CreateWindowExA
GetWindowTextLengthA
GetCapture
GetDlgCtrlID
ChangeClipboardChain
GetCursorPos
ToAscii
SetRect
EnumDisplaySettingsA
GetClassNameW
DrawAnimatedRects
ChangeDisplaySettingsW
VkKeyScanW
EnumThreadWindows
IsDlgButtonChecked
DefDlgProcA
CharLowerA
GetScrollInfo
CharLowerBuffA
GetWindow
RegisterHotKey
ReleaseDC
LoadStringW
GetMessageW
InvalidateRgn
IsCharUpperA
LoadBitmapW
IsWindowEnabled
LoadAcceleratorsA
wvsprintfA
SystemParametersInfoA
GetMenuItemCount
DestroyAcceleratorTable
DdeClientTransaction
DialogBoxIndirectParamA
GetDC
ClipCursor
GetClipboardViewer
CallMsgFilterA
DrawStateW
LoadKeyboardLayoutA
MapVirtualKeyW
IsZoomed
SystemParametersInfoW
RegisterClipboardFormatW
LockWindowUpdate
InsertMenuA
VkKeyScanExA
SetMenu
GetPropA
GetClipCursor
CreateDialogIndirectParamA
IsMenu
DefWindowProcA
EnumDisplaySettingsW
AppendMenuW
IsDialogMessageA
CreateDialogIndirectParamW
CopyIcon
DefDlgProcW
GetTabbedTextExtentA
UnionRect
ChildWindowFromPointEx
CheckMenuItem
DefWindowProcW
TranslateAcceleratorW
CharUpperBuffW
FindWindowExW
BlockInput
GetFocus
RegisterWindowMessageA
GetParent
IsClipboardFormatAvailable
GetUpdateRgn
GetKeyboardState
ShowCursor
rasapi32
RasHangUpA
RasGetProjectionInfoA
advapi32
RegDeleteValueW
CreateServiceW
OpenEventLogW
RegCreateKeyExA
RegCreateKeyA
GetLengthSid
SetEntriesInAclA
RegNotifyChangeKeyValue
ImpersonateSelf
InitializeSid
GetSecurityDescriptorDacl
EnumDependentServicesW
QueryServiceLockStatusA
RegOpenKeyExA
SetThreadToken
ChangeServiceConfigA
ChangeServiceConfig2W
RegisterServiceCtrlHandlerW
RegCloseKey
SetKernelObjectSecurity
GetUserNameW
GetServiceDisplayNameW
GetSidSubAuthorityCount
RegQueryValueW
RegisterServiceCtrlHandlerA
LookupAccountNameW
ChangeServiceConfigW
EncryptFileW
OpenServiceA
CreateProcessAsUserW
QueryServiceConfigW
EnumDependentServicesA
RegOverridePredefKey
RegConnectRegistryA
ReadEventLogW
SetServiceStatus
RegSetKeySecurity
RegRestoreKeyW
LsaRetrievePrivateData
RegOpenKeyExW
SetSecurityDescriptorDacl
LsaAddAccountRights
LsaQueryInformationPolicy
InitializeSecurityDescriptor
EnumServicesStatusA
LookupAccountSidA
DeleteAce
AllocateAndInitializeSid
IsValidSecurityDescriptor
msvcrt
_findnext
_fgetchar
_onexit
_rotl
_spawnlpe
labs
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_mktemp
_controlfp
__dllonexit
_setmbcp
kernel32
GetVolumeInformationW
EnumDateFormatsA
BeginUpdateResourceW
GetModuleHandleA
GetStartupInfoA
GetSystemDirectoryW
imm32
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCompositionFontA
ImmAssociateContext
ImmSetCandidateWindow
ImmGetDefaultIMEWnd
ImmDestroyContext
ImmGetOpenStatus
ImmConfigureIMEA
ImmSetStatusWindowPos
ImmUnregisterWordA
mfc42
ord3346
ord2396
ord1046
ord1089
ord3922
ord5731
ord1051
ord2554
ord4486
ord6375
ord4274
ord1039
ord5714
ord2982
ord1000
ord3259
ord4465
ord1093
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord5302
ord2725
ord1048
ord4698
ord5307
ord1084
ord1016
ord2379
ord470
ord755
ord1066
ord1168
ord4710
ord4234
ord324
ord1018
ord4425
ord4627
ord1002
ord1097
ord1018
ord1576
ord5261
ord1727
ord3825
ord3079
ord4080
ord1080
ord4424
ord3738
ord561
ord815
ord2514
ord641
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord1060
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord1022
ord2055
ord6376
ord3749
ord5065
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ