Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8f8aa8d8087dc37d48cc685ab03e7581.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8f8aa8d8087dc37d48cc685ab03e7581.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_8f8aa8d8087dc37d48cc685ab03e7581
-
Size
425KB
-
MD5
8f8aa8d8087dc37d48cc685ab03e7581
-
SHA1
0161d4a556213328e487c95df1d73ab81deb2755
-
SHA256
359f1411323ca4b02b59aacb10d8492b3dcbe43fe27ca47169ea73ac99a2eb4f
-
SHA512
705386c321cffec1e99ebf5fc31aac4f0fa9cc49e1e8a450f652349600bd28c5dc59edf394a423b8d69931bacb5cba947675524dad974eda500baab9af4363c4
-
SSDEEP
6144:6cdWauU1vWUxsKZ8dNKaFyxjTYB732E3hNgG/B7RzXs6DkP3+yzvU/YfOWi:6c0aNd5sNFy+133hyG/Bt8337sA2f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_8f8aa8d8087dc37d48cc685ab03e7581
Files
-
VirusShare_8f8aa8d8087dc37d48cc685ab03e7581.exe windows:5 windows x86 arch:x86
1637cd6bad766912a0a8d5f2fc6625b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wvsprintfA
UnhookWindowsHookEx
SetWindowTextA
SetWindowTextW
GetDlgItem
SendMessageW
GetNextDlgTabItem
GetMenuItemCount
IsZoomed
GetDlgItemTextA
GetWindowThreadProcessId
DispatchMessageA
CloseClipboard
IsClipboardFormatAvailable
VkKeyScanA
ExcludeUpdateRgn
GetCursor
GetWindowRgnBox
HiliteMenuItem
DrawFocusRect
GetClipboardFormatNameW
MapVirtualKeyA
SendMessageA
GetKeyState
ScreenToClient
CharPrevA
GetKeyboardLayoutList
DestroyIcon
CallNextHookEx
SetWindowsHookExA
MessageBoxW
GetParent
GetWindow
wsprintfA
SetDlgItemTextA
EndDialog
ShowWindow
GetClientRect
GetSystemMenu
EnableMenuItem
GetDesktopWindow
LoadIconA
SetTimer
GetWindowDC
DrawTextA
ReleaseDC
SetWindowPos
GetWindowRect
DialogBoxParamA
comdlg32
CommDlgExtendedError
ChooseColorA
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameW
GetSaveFileNameA
ole32
CreateFileMoniker
CreateBindCtx
OleCreateMenuDescriptor
GetRunningObjectTable
advapi32
RegDeleteKeyW
gdi32
DPtoLP
GdiComment
SetAbortProc
SetViewportOrgEx
EndPath
GdiTransparentBlt
RectVisible
CreateHatchBrush
ExcludeClipRect
Arc
GetColorSpace
CreateHalftonePalette
GetGlyphIndicesA
SetICMMode
ArcTo
GdiGradientFill
SetROP2
Polyline
SetICMProfileA
GetCurrentObject
CreateCompatibleBitmap
CreatePatternBrush
SetBkMode
SetPixel
StretchBlt
kernel32
SystemTimeToFileTime
GetLocalTime
GetProcAddress
LoadLibraryA
GetCurrentThreadId
LocalFree
lstrcpyA
lstrlenA
FormatMessageA
GetModuleHandleA
WideCharToMultiByte
AreFileApisANSI
ExpandEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetTapeStatus
SetProcessPriorityBoost
CheckRemoteDebuggerPresent
CreateIoCompletionPort
ConvertThreadToFiber
GetMailslotInfo
CreateFiberEx
CreateDirectoryA
CreateDirectoryW
SetFileAttributesA
SetFileAttributesW
DeleteFileA
GetNamedPipeHandleStateW
LockFileEx
VirtualAllocEx
DecodePointer
SetThreadContext
GetSystemDefaultLangID
IsDebuggerPresent
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
MultiByteToWideChar
GetExitCodeProcess
DisableThreadLibraryCalls
lstrcpynA
lstrcpyW
lstrcmpiA
WriteConsoleW
WriteConsoleA
WaitForSingleObjectEx
VirtualQuery
VirtualProtect
UnmapViewOfFile
TlsFree
TerminateThread
Sleep
SetupComm
SetThreadPriority
SetHandleInformation
SetErrorMode
SetCurrentDirectoryW
SetConsoleMode
SetCommTimeouts
SetCommState
SearchPathW
SearchPathA
RemoveDirectoryW
ReleaseSemaphore
ReadConsoleW
ReadConsoleA
QueryPerformanceFrequency
QueryPerformanceCounter
PurgeComm
PeekNamedPipe
PeekConsoleInputA
OutputDebugStringA
MulDiv
MoveFileW
MoveFileA
MapViewOfFile
LockResource
LoadResource
LoadLibraryExW
LoadLibraryExA
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetTimeZoneInformation
GetTickCount
GetTempPathW
GetTempFileNameW
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemInfo
GetShortPathNameW
GetShortPathNameA
GetProcessHeap
GetPrivateProfileStringA
GetOverlappedResult
GetModuleFileNameW
GetLogicalDriveStringsA
GetLocaleInfoA
GetFullPathNameW
GetFullPathNameA
GetFileInformationByHandle
GetEnvironmentVariableW
GetCurrentThread
GetCurrentDirectoryW
GetCurrentDirectoryA
GetConsoleMode
GetConsoleCP
GetComputerNameW
GetComputerNameA
GetCommState
GetCommModemStatus
FreeLibrary
FlushFileBuffers
FindResourceA
FindNextFileW
FindFirstFileW
EscapeCommFunction
DuplicateHandle
DeviceIoControl
CreateSemaphoreA
CreateProcessW
CreateProcessA
CreatePipe
CreateFileMappingA
CopyFileW
CopyFileA
ClearCommError
BuildCommDCBW
BuildCommDCBA
RtlUnwind
CloseHandle
RaiseException
HeapAlloc
HeapFree
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetExitCodeThread
ReadFile
WaitForSingleObject
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateEventA
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
SetEndOfFile
SetFileTime
CreateThread
SetFilePointer
GetFileSize
CreateFileW
ResetEvent
WaitForMultipleObjects
SetEvent
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
GetDriveTypeA
CreateFileA
WriteFile
GetVersionExA
GetCommandLineW
GetModuleFileNameA
SetCurrentDirectoryA
GetTempPathA
FindFirstFileA
lstrcmpA
FindNextFileA
FindClose
RemoveDirectoryA
lstrlenW
DeleteFileW
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 353KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
AASASASA Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BSS Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ