Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad
-
Size
368KB
-
MD5
501d52bcc05636268a66a6e9f1c5c4ad
-
SHA1
2199071c4190b6aae6ec7dc65ced83301883d714
-
SHA256
7659872c938b820b351446509964ed4fcbc405b58e43694722f00bb42b277dd6
-
SHA512
d72db00dad74a6d15d59cd7dbb401f5f86706242b95a6c57dc12c9b33590fefe951b56043eae3f0125bd5240baad46edd919872820e40a8dac5109a3a7e222b8
-
SSDEEP
6144:GQNUdPR6oncUtPLJoJi8ju8FQNXsyR36GeHba2grj9F4SENppTUHtnvR3aF3J9PQ:jNUdc6wA8P2cyF6T7a2gH9F4dzhUl6rP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_501d52bcc05636268a66a6e9f1c5c4ad
Files
-
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad.exe windows:4 windows x86 arch:x86
10e51eb9a3fe22714169d210a979dc4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
ImageGetCertificateHeader
advapi32
RegCreateKeyExW
RegNotifyChangeKeyValue
RegDeleteValueW
GetLengthSid
QueryServiceLockStatusW
AddAccessAllowedAce
DeleteService
InitializeSecurityDescriptor
RegCreateKeyA
DeleteAce
QueryServiceConfigA
GetSidSubAuthorityCount
RegCreateKeyW
RegEnumKeyExA
LsaQueryInformationPolicy
GetSidIdentifierAuthority
GetFileSecurityW
CopySid
OpenSCManagerW
CreateServiceW
GetUserNameW
GetServiceDisplayNameW
RegSetValueA
ControlService
RegReplaceKeyA
EnumDependentServicesW
LookupAccountNameW
ChangeServiceConfig2A
RegisterServiceCtrlHandlerA
SetEntriesInAclA
RegQueryInfoKeyA
LsaAddAccountRights
QueryServiceStatus
GetKernelObjectSecurity
SetSecurityDescriptorSacl
RegQueryInfoKeyW
ReportEventW
RegEnumKeyW
ReadEventLogW
RegRestoreKeyW
DecryptFileW
AdjustTokenPrivileges
RegCloseKey
AddAce
LsaFreeMemory
RegOpenKeyExA
InitializeAcl
RegSetValueW
LogonUserA
StartServiceCtrlDispatcherW
SetSecurityDescriptorOwner
ReportEventA
CreateProcessAsUserA
SetFileSecurityA
RegDeleteKeyA
RevertToSelf
RegOverridePredefKey
OpenServiceA
EncryptFileW
InitializeSid
StartServiceA
LsaRetrievePrivateData
GetSidSubAuthority
ChangeServiceConfigW
RegUnLoadKeyW
RegSetKeySecurity
RegisterServiceCtrlHandlerW
RegSetValueExW
AllocateAndInitializeSid
ChangeServiceConfigA
SetFileSecurityW
FreeSid
LockServiceDatabase
OpenSCManagerA
RegisterEventSourceA
LookupPrivilegeValueA
ChangeServiceConfig2W
OpenEventLogW
OpenProcessToken
GetAce
EnumDependentServicesA
RegConnectRegistryA
SetThreadToken
GetUserNameA
ImpersonateSelf
LsaOpenPolicy
SetNamedSecurityInfoW
LookupAccountNameA
LookupPrivilegeValueW
SetServiceObjectSecurity
GetAclInformation
RegOpenKeyExW
gdi32
GetTextFaceA
CreateMetaFileA
ScaleViewportExtEx
CreateBitmap
CopyEnhMetaFileA
PolyBezierTo
GetTextAlign
SetPixelV
CreateFontIndirectW
TextOutA
user32
KillTimer
ScrollWindowEx
PeekMessageW
VkKeyScanExW
SetWindowTextW
DialogBoxParamA
IsCharAlphaW
CloseDesktop
GetClipCursor
ScrollWindow
IsClipboardFormatAvailable
DrawTextA
LoadIconA
SetWindowPlacement
CharPrevW
RemoveMenu
TrackPopupMenu
GetClipboardViewer
ReleaseDC
GetOpenClipboardWindow
GetPropA
EnumDisplaySettingsW
GetUserObjectInformationW
ShowWindow
GetCapture
CharNextA
PackDDElParam
GetLastActivePopup
DefWindowProcA
CreatePopupMenu
PostMessageW
DrawTextW
DialogBoxIndirectParamA
AdjustWindowRect
GetMenu
BringWindowToTop
GetClipboardFormatNameW
GetKeyState
TranslateAcceleratorW
TranslateMessage
ScreenToClient
IsWindowVisible
CharLowerA
DeferWindowPos
GetCaretPos
OemToCharBuffA
CloseWindow
MapVirtualKeyA
SendDlgItemMessageA
LoadKeyboardLayoutW
FindWindowExA
CreateDialogIndirectParamA
DestroyMenu
SetForegroundWindow
VkKeyScanW
DrawFrameControl
IsCharLowerA
GetWindowRect
SetScrollPos
GetDlgItemTextW
WaitMessage
GetClassInfoA
DdeClientTransaction
GetTabbedTextExtentA
ClipCursor
EnumThreadWindows
EmptyClipboard
IsWindowEnabled
GetDoubleClickTime
CharToOemA
GetClassNameA
BlockInput
IsDlgButtonChecked
PostThreadMessageW
LoadAcceleratorsA
ChangeDisplaySettingsW
InvalidateRect
FindWindowExW
GetSysColorBrush
GetWindowTextLengthA
CheckRadioButton
LoadCursorFromFileA
RegisterClipboardFormatW
FindWindowA
IsIconic
SetRect
ClientToScreen
AttachThreadInput
InsertMenuW
WindowFromDC
GetClassLongA
GetMenuItemCount
LoadBitmapW
DrawAnimatedRects
SetWindowTextA
UnionRect
GetMenuItemID
UnhookWindowsHook
ShowCursor
FrameRect
DrawIcon
TrackPopupMenuEx
GetDlgItemInt
LoadBitmapA
CallWindowProcA
DestroyAcceleratorTable
CopyAcceleratorTableW
DestroyCursor
PostQuitMessage
GetDC
ToAscii
WindowFromPoint
OffsetRect
SetWindowPos
TranslateMDISysAccel
EnableWindow
UnhookWinEvent
CopyIcon
DrawTextExA
GetProcessWindowStation
wvsprintfA
GetClipboardData
GetWindowModuleFileNameA
DdeAccessData
GetCursorPos
CharUpperW
ChangeDisplaySettingsA
GetKeyboardLayoutNameW
DispatchMessageA
CharUpperA
GetWindowWord
PostMessageA
PaintDesktop
SendInput
SystemParametersInfoW
GetWindowLongW
GetMessageA
DispatchMessageW
LoadStringW
IsCharAlphaNumericA
RegisterClipboardFormatA
SetRectEmpty
GetDlgItemTextA
msvcrt
_setmbcp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
abs
_i64tow
ldiv
_onexit
__dllonexit
_pipe
_controlfp
mfc42
ord1576
ord561
ord3738
ord4424
ord1046
ord4080
ord3079
ord3825
ord3831
ord3830
ord3401
ord2976
ord3081
ord2985
ord3262
ord1071
ord4465
ord3259
ord1045
ord2982
ord3953
ord5714
ord1017
ord5307
ord4698
ord1037
ord2725
ord5302
ord1074
ord3346
ord2396
ord1007
ord1089
ord3922
ord5731
ord1051
ord2554
ord4486
ord6375
ord815
ord1168
kernel32
GetStartupInfoA
GetModuleHandleA
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ