?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_23b1602a6588d25277d9b144339b1270.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_23b1602a6588d25277d9b144339b1270.exe
Resource
win10v2004-20240426-en
Target
VirusShare_23b1602a6588d25277d9b144339b1270
Size
100KB
MD5
23b1602a6588d25277d9b144339b1270
SHA1
3c7107c8686a6913e2e7ba0966cfa28e1c56c40c
SHA256
0bebef441c3b93744ec826190dccbd2044c1d13b1f0d16d783bfc24a6639f7d4
SHA512
0a5fdbad36caa31225c0b49ab10730ec124d469a84282ed803e9d54f3051c45872171b26b53b54c06d5a09d2c573521173ef8ddbf6ca4ceed9adf73bec5ef6b1
SSDEEP
1536:fHZ/S0Ax3IQumqpl9cy4veQzOtLKCDpDYPLv8gDEgR5lO:voZ3azcy4veQzO9D6PomEgRP
Checks for missing Authenticode signature.
resource |
---|
VirusShare_23b1602a6588d25277d9b144339b1270 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ