Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8834f4fd855bc261dceb17c9548e6523.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_8834f4fd855bc261dceb17c9548e6523.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8834f4fd855bc261dceb17c9548e6523
-
Size
392KB
-
MD5
8834f4fd855bc261dceb17c9548e6523
-
SHA1
d9ec732cc256d21472e402bf362b7b56584f4b8f
-
SHA256
a2ebf94a85a15f9fa13ffd40b99890aeff6a1e42332eb976cbc5ca26714e139e
-
SHA512
2abe58d4c926d88d8663e88084303c13ffb6b600b36d3bfedd62b9fcaa7959590e657eb36c5550ebc7b901851a18c7d1de29fc84bf3896bc3754569a5c3674a3
-
SSDEEP
6144:FkEIcU9C03EfN9UPl3E6tK477Ai1eTkNkcjh24+OSnJCz6f5LO:WcgC03gGLK4fAceNM21k6hL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_8834f4fd855bc261dceb17c9548e6523
Files
-
VirusShare_8834f4fd855bc261dceb17c9548e6523.exe windows:4 windows x86 arch:x86
4d4f7ee98d549ade5de00c94c6fb4dcf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
sin
_CIfmod
puts
_onexit
_setmbcp
__dllonexit
_safe_fdiv
imagehlp
ImageGetCertificateHeader
MapFileAndCheckSumA
ImageUnload
ImageGetCertificateData
ImageGetDigestStream
UpdateDebugInfoFileEx
ImageEnumerateCertificates
gdi32
EnumFontsW
CreatePenIndirect
PolyBezierTo
CreateFontIndirectA
SetTextAlign
PolyDraw
TextOutA
GetObjectW
PolyPolyline
ResizePalette
CreateFontW
PolyBezier
GetKerningPairsA
EnumFontsA
OffsetViewportOrgEx
SetAbortProc
ExtEscape
GetTextExtentPoint32W
Polygon
GetGlyphOutlineA
GetClipBox
GetTextMetricsW
GetTextMetricsA
SetBkColor
CreateICA
GetTextAlign
ExtFloodFill
DeleteDC
LPtoDP
GetGlyphOutlineW
SetBitmapBits
CloseEnhMetaFile
CreateEnhMetaFileA
SetDIBColorTable
RectVisible
SwapBuffers
AbortDoc
DeleteEnhMetaFile
RectInRegion
RemoveFontResourceA
EndDoc
CreateDIBPatternBrushPt
OffsetWindowOrgEx
UnrealizeObject
SetPixel
GetPixel
SaveDC
Pie
GetBitmapBits
CreateCompatibleDC
CreateDCA
SetViewportExtEx
SetArcDirection
GetWinMetaFileBits
DPtoLP
Rectangle
Arc
BitBlt
SelectPalette
StretchBlt
GetRgnBox
EnumMetaFile
WidenPath
SetROP2
SetDeviceGammaRamp
GetWindowOrgEx
SetColorAdjustment
GetMapMode
GetObjectA
IntersectClipRect
EnumFontFamiliesA
CreatePolygonRgn
FillRgn
StartDocA
CreateRectRgn
GetFontData
DeleteObject
ScaleViewportExtEx
GetClipRgn
RealizePalette
GetTextFaceA
Ellipse
GetObjectType
SetViewportOrgEx
CombineRgn
SetWindowOrgEx
RestoreDC
CreateFontA
EqualRgn
SetWindowExtEx
GetROP2
Chord
FillPath
SetPolyFillMode
GetBrushOrgEx
EnumFontFamiliesExW
StartPage
SelectClipRgn
GetEnhMetaFilePaletteEntries
DeleteColorSpace
SetRectRgn
GetTextExtentPointA
CreateDCW
PlayEnhMetaFile
GetTextExtentPoint32A
GetEnhMetaFileBits
SetTextColor
CreateBitmap
ExtCreateRegion
GetBkMode
PtVisible
CreateCompatibleBitmap
GetTextCharsetInfo
CreateICW
CreateEllipticRgn
ExtCreatePen
GetDIBColorTable
SetStretchBltMode
ScaleWindowExtEx
GetCharABCWidthsW
CreateRoundRectRgn
SetWorldTransform
GetDeviceCaps
CreateMetaFileA
StrokePath
GetNearestPaletteIndex
SetMetaFileBitsEx
SetGraphicsMode
ResetDCW
kernel32
GetModuleHandleA
GetComputerNameA
GetWindowsDirectoryA
FindNextFileA
GetStartupInfoA
mfc42
ord3830
ord3401
ord3825
ord3079
ord4080
ord1080
ord4424
ord3738
ord561
ord1576
ord2976
ord3081
ord2985
ord3262
ord3831
ord1168
ord815
ord6375
ord4486
ord2554
ord1085
ord5731
ord3922
ord1089
ord1064
ord2396
ord3346
ord1092
ord5302
ord2725
ord1030
ord4698
ord5307
ord1048
ord5714
ord3953
ord2982
ord1035
ord3259
ord4465
ord1084
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ