?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_671fd2172d8ed3f20a12a15733f19880.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_671fd2172d8ed3f20a12a15733f19880.exe
Resource
win10v2004-20240426-en
Target
VirusShare_671fd2172d8ed3f20a12a15733f19880
Size
100KB
MD5
671fd2172d8ed3f20a12a15733f19880
SHA1
f5ac7a77a5185e2c30ec30409ca4397fc30b0241
SHA256
47b4d7c57d7b894d1f63982358a214fdc24337b9db77984d6ca7935269a2e98a
SHA512
b4b4a8df2b948d9864ba53b0a98c0b6ca037f5bfe6fe78db06a496783e0757c990f6031109d3b7326e810de2dffdf96c2bc80dbbccf403ab75acceef6b7ce241
SSDEEP
1536:fH2/S0Ax3IQumqpl9cy4veQzOtLKCD4DYPLv8gDEgRNlO:vRZ3azcy4veQzO9DJPomEgRz
Checks for missing Authenticode signature.
resource |
---|
VirusShare_671fd2172d8ed3f20a12a15733f19880 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TerminateThread
TerminateProcess
GetSystemDirectoryA
GetProcAddress
GetTickCount
GetModuleHandleA
LoadLibraryW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
LoadBitmapA
ShowWindow
SetWindowTextA
LoadIconA
EnableWindow
DestroyWindow
CoInitialize
select
?FCalcI2@@YAKK@Z
?FCalcI@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ