Static task
static1
Behavioral task
behavioral1
Sample
31581a6f5822cd65e3e22571292e3617b86fe76d87d301f8d9aa1d7f87495dc8.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
31581a6f5822cd65e3e22571292e3617b86fe76d87d301f8d9aa1d7f87495dc8.exe
Resource
win11-20240508-en
General
-
Target
VirusShare_2498a8b0f3bb1595a145448f21ac5928.zip
-
Size
332KB
-
MD5
04b5e7560a9a7359fab53c007aba9a60
-
SHA1
5a8bfcd3590a490579142c62905ac9daf1f1757c
-
SHA256
c6dae90a00e614781c88507e393837f6bcc17c0583349d4aabe14f95798eab10
-
SHA512
0846d637db729c9e0e501c37122abe3f4d57ed9ce1db3bab88f82b4590a0ccbe28817ff1454045e0910515bd91aafa85fc5e89d8affc135f0374b954bfa5a6c8
-
SSDEEP
6144:2qf6wp5mxQB8nMde7wVjzihORwawUjLWqqke38CrevqcdJTWOXt:F7pgxQ6jqigRwnUfzebrQp7Tv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/31581a6f5822cd65e3e22571292e3617b86fe76d87d301f8d9aa1d7f87495dc8
Files
-
VirusShare_2498a8b0f3bb1595a145448f21ac5928.zip.zip
Password: infected
-
31581a6f5822cd65e3e22571292e3617b86fe76d87d301f8d9aa1d7f87495dc8.exe windows:5 windows x86 arch:x86
Password: infected
956da3812e2fd7d64644f41af6c72f27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
OpenClipboard
ExitWindowsEx
PostQuitMessage
SetWindowTextA
EnableWindow
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
shell32
SHGetSpecialFolderLocation
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
SHFileOperationA
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
gdi32
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SetBkColor
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
SetStdHandle
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetStringTypeA
GetCPInfo
LoadLibraryA
WriteConsoleA
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
HeapSize
GetLocaleInfoA
LCMapStringA
GetStringTypeW
LCMapStringW
GetACP
SetHandleCount
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetProcAddress
GetTempPathA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
GetLastError
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ