Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_a9afec600ada9befd64feacf13f3f5f2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_a9afec600ada9befd64feacf13f3f5f2.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_a9afec600ada9befd64feacf13f3f5f2
-
Size
340KB
-
MD5
a9afec600ada9befd64feacf13f3f5f2
-
SHA1
16cdef54a241e9007c4f84e5db0356a077d5c976
-
SHA256
b96e54607b342d02734649140941ebdabbbe465bdf81f4a354a591fb2dac3b5d
-
SHA512
17a0c634df7f2b8c8a683d9fbfe0b2c6699437ac3c8b077d3323c96b9e1ac4ec93c3ffa388a0f85909f40bd59ff229e23e20036596c775295e00a6771ccac214
-
SSDEEP
6144:ZNf6izlTTr9fPenjaYdvBfHGGc8ouQ+yvJB+Fx6Czf4yMFRv4U4nFfYsiwXeD:ZNfVd6dvJHbfo6wszdgyMFRQU4FQhwuD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_a9afec600ada9befd64feacf13f3f5f2
Files
-
VirusShare_a9afec600ada9befd64feacf13f3f5f2.exe windows:4 windows x86 arch:x86
9376c33905ec1ead97eec8325874d862
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
UpdateICMRegKeyA
SetRectRgn
GetTextMetricsW
CreateEllipticRgn
ExtTextOutW
SetPixel
FrameRgn
GetTextExtentPoint32W
CombineRgn
PolyPolygon
GetBitmapBits
SetTextAlign
CreateFontW
SetAbortProc
GetCharABCWidthsW
GetDeviceGammaRamp
GetEnhMetaFileDescriptionA
SetBrushOrgEx
GetGraphicsMode
CreateDiscardableBitmap
ExtCreateRegion
EnumFontFamiliesA
GetObjectW
CombineTransform
IntersectClipRect
SetPolyFillMode
GetTextMetricsA
SetWorldTransform
GetCharWidth32A
SetGraphicsMode
GetKerningPairsA
GetDIBits
GetEnhMetaFileHeader
EnumFontsA
SetPixelV
CloseMetaFile
SetDIBitsToDevice
EndDoc
GetCurrentObject
SetMapperFlags
GetAspectRatioFilterEx
GetRgnBox
SetBkMode
Ellipse
GetNearestPaletteIndex
SetTextColor
CreateRectRgnIndirect
CloseFigure
GetTextExtentPoint32A
ExtCreatePen
GetMetaRgn
GetROP2
GdiGetBatchLimit
GetCharWidthA
CreateScalableFontResourceW
GetObjectType
CreatePen
FillPath
CreateDIBSection
CreateMetaFileA
EnumEnhMetaFile
AbortPath
SetBkColor
SelectObject
GetTextExtentExPointW
StartDocA
GetBrushOrgEx
SetArcDirection
PolylineTo
CloseEnhMetaFile
GetCharacterPlacementA
ExcludeClipRect
WidenPath
SelectClipPath
Escape
EqualRgn
SetICMProfileA
DeleteEnhMetaFile
AddFontResourceW
GetRegionData
GetLogColorSpaceA
StretchBlt
GetICMProfileW
GetTextCharacterExtra
CreateMetaFileW
GetCharWidth32W
GetCharABCWidthsFloatA
CreatePalette
CreateHatchBrush
AddFontResourceA
SetColorSpace
AngleArc
CreateDIBPatternBrush
CreateBitmapIndirect
SetBitmapDimensionEx
PlayMetaFileRecord
SwapBuffers
CreateFontIndirectA
CreateHalftonePalette
GetArcDirection
GetFontData
msvcrt
_memicmp
user32
DrawTextW
CreateMDIWindowW
GetMenuItemInfoW
GetClipboardData
DdeFreeStringHandle
SetDoubleClickTime
SetMenu
CopyImage
OemToCharA
GetClientRect
SetCaretBlinkTime
TrackPopupMenu
CreateIconFromResourceEx
EnumDesktopsW
DefWindowProcW
EndDialog
DlgDirSelectExA
CheckRadioButton
AppendMenuW
SetWindowsHookExA
CreateCursor
GetClipboardFormatNameW
CharToOemBuffA
GetParent
GetFocus
SetLastErrorEx
PaintDesktop
InsertMenuItemW
CharLowerBuffW
MapVirtualKeyExW
CloseDesktop
advapi32
GetFileSecurityA
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
DuplicateTokenEx
GetSidSubAuthorityCount
DuplicateToken
BuildImpersonateTrusteeA
comdlg32
GetFileTitleA
comctl32
ImageList_Duplicate
InitCommonControlsEx
oleaut32
LPSAFEARRAY_UserSize
mpr
WNetGetProviderNameA
netapi32
NetServerEnum
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
TLS Size: 240KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ