Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_324a5e2d94a582ac46fbd16845471b90.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_324a5e2d94a582ac46fbd16845471b90.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_324a5e2d94a582ac46fbd16845471b90
-
Size
255KB
-
MD5
324a5e2d94a582ac46fbd16845471b90
-
SHA1
078d646856b3940cb85058cc6d2d6cf9ba59f183
-
SHA256
5142a11b9687eb5982cc441271f4ef437e4b4fca317446defd0d3066b3599b75
-
SHA512
4d6af6a544377b84af788fc2fdf6b7d47cfe8c36ca905e8df6eddb825ea25dece51c32be5c6a0b6a611651470e550026946114c943549ab61727a720fce05d97
-
SSDEEP
6144:TyOT23wsCLlfed+Nw7MT+JHPnsl6wpnbAdr:TTTQwsChfZNXQHUgIar
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_324a5e2d94a582ac46fbd16845471b90
Files
-
VirusShare_324a5e2d94a582ac46fbd16845471b90.exe windows:5 windows x86 arch:x86
41c31af07d88b443687875164dfc17b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LockWorkStation
CharNextA
PtInRect
InflateRect
SetParent
SetDlgItemTextW
oledlg
OleUIPromptUserW
ord4
OleUIPasteSpecialW
OleUIChangeSourceW
OleUIObjectPropertiesW
ord1
ord5
kernel32
TlsAlloc
HeapSize
GetProcessHeap
SetEndOfFile
CreateFileW
LoadLibraryW
IsProcessorFeaturePresent
HeapReAlloc
ReadFile
HeapAlloc
CreateFileA
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetStdHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetLastError
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapFree
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
DeleteCriticalSection
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
LCMapStringW
MultiByteToWideChar
Sleep
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
ExitProcess
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteConsoleW
SetFilePointer
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ