Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_66ed288ea17c56e42403453d3e24b0eb.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_66ed288ea17c56e42403453d3e24b0eb.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_66ed288ea17c56e42403453d3e24b0eb
-
Size
372KB
-
MD5
66ed288ea17c56e42403453d3e24b0eb
-
SHA1
6c1cc259a72384c96b1de272b65957ec7953bcf7
-
SHA256
5810e8debe3e5b1aa735ef725c83ebaf88a42bb605cadabbfc37adcc89a1802d
-
SHA512
b18d08022781666eb347093ed26baa3319f6d34ae576e69c935481563cbdd47eccffedba6875ab71539a419fb242747c4d870723fd0bc6a9154a24fb2d327f8c
-
SSDEEP
6144:4912+fyhCsYOyUAQG7rJzPKwVLy7+rc+++yl4w/NY9Hd4prd9emQjO45ZJqS:49dsvA/NBy7UOvl9lYT4ldVi7JP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_66ed288ea17c56e42403453d3e24b0eb
Files
-
VirusShare_66ed288ea17c56e42403453d3e24b0eb.exe windows:4 windows x86 arch:x86
c3c11c3bdc3b047819cdebc81a14d3f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
ImageGetCertificateHeader
user32
MapWindowPoints
FindWindowExW
SendInput
SetWindowTextW
SetWindowRgn
InSendMessage
SetFocus
GetWindowThreadProcessId
GetSysColor
WinHelpA
LoadCursorFromFileA
TranslateAcceleratorW
AttachThreadInput
LoadIconA
SetCaretBlinkTime
LoadMenuA
DestroyCursor
EnumThreadWindows
UnpackDDElParam
GetClipboardViewer
OffsetRect
EnableScrollBar
GetMessageW
SetMenuDefaultItem
WindowFromDC
FindWindowW
DialogBoxIndirectParamW
DestroyMenu
GetKeyboardState
GetNextDlgTabItem
RegisterClassExW
GetClassInfoExW
GetScrollPos
RegisterClipboardFormatW
ReuseDDElParam
GetKeyState
DeferWindowPos
TranslateMessage
CharNextW
FindWindowA
AdjustWindowRect
wvsprintfA
InvalidateRect
DrawStateA
VkKeyScanW
IsCharAlphaW
CharUpperBuffW
KillTimer
MapVirtualKeyExW
SetCapture
IntersectRect
CharLowerA
DdeQueryStringA
SetRect
GetMessagePos
CreateDialogIndirectParamW
IsWindow
CheckMenuItem
SetTimer
TranslateMDISysAccel
MessageBeep
FrameRect
GetSystemMetrics
SystemParametersInfoA
GetOpenClipboardWindow
GetWindowLongA
PtInRect
GetWindowTextA
GetForegroundWindow
DispatchMessageA
DefWindowProcA
GetDlgItemInt
GetWindowLongW
IsMenu
GetParent
PostMessageW
SetWindowPos
GetLastActivePopup
DialogBoxParamA
BringWindowToTop
DestroyAcceleratorTable
SetDlgItemTextW
MoveWindow
CloseWindow
kernel32
AllocConsole
GetStartupInfoA
GetModuleHandleA
GetCurrentDirectoryA
msvcrt
_adjust_fdiv
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_initterm
__getmainargs
_acmdln
cosh
_chdir
_itoa
_onexit
__dllonexit
_stati64
_setmbcp
mfc42
ord3738
ord4424
ord1065
ord4080
ord3079
ord3825
ord3831
ord3830
ord3401
ord2976
ord3081
ord2985
ord3262
ord1082
ord4465
ord3259
ord1030
ord561
ord3953
ord5714
ord1014
ord5307
ord4698
ord1035
ord2725
ord5302
ord1050
ord3346
ord2396
ord1071
ord1089
ord3922
ord5731
ord1027
ord2554
ord4486
ord6375
ord815
ord1576
ord2982
ord1168
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ