Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3
-
Size
356KB
-
MD5
a8e0b0186e5159aa8a772e8d4169d3f3
-
SHA1
7c1f0f6fc4fd2669717e632652ff8a99fb093e69
-
SHA256
1cf433abd42285879b502b2d01958fff3fe4ad687a0e7c1fba243ffbffe7f34e
-
SHA512
01fa49ff7921b380f0390a1ba9c4beff61278685d9caabe188d84977b73fffe7ffe51360677fbaa0319c0e4d4387804c665a7671ad63e4f8a8bc6c8ae0fe55fa
-
SSDEEP
6144:rOWcl+ocAAe1EAnT43osv0pnzKK+PDncAuLELquaWVzsHA93Wo8nswPm22fwh:rFeq0F+PzcOLyWRsHA93/oswe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3
Files
-
VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe windows:4 windows x86 arch:x86
8d99023a51a2afe075f983867689c9f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
PlayEnhMetaFileRecord
GetSystemPaletteEntries
EqualRgn
EndPage
ExtSelectClipRgn
CancelDC
GetROP2
DPtoLP
LPtoDP
CreateDCW
DeleteEnhMetaFile
GetTextExtentPoint32W
CreateFontW
SetPixelFormat
FillPath
GetBkColor
Polygon
msvcrt
_inpw
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_eof
printf
_jn
_onexit
__dllonexit
scanf
__pioinfo
_controlfp
advapi32
CreateProcessAsUserA
SetSecurityDescriptorGroup
CreateServiceA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 541KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ