Static task
static1
Behavioral task
behavioral1
Sample
VirusShare53b1743df6b607ba17cdad0157fc3e1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VirusShare53b1743df6b607ba17cdad0157fc3e1a.exe
Resource
win10v2004-20240802-en
General
-
Target
VirusShare53b1743df6b607ba17cdad0157fc3e1a
-
Size
764KB
-
MD5
53b1743df6b607ba17cdad0157fc3e1a
-
SHA1
f0205a784c6a76785b3ccc4ee71196daf5adfd54
-
SHA256
311d088d7c22fea0c84e1f53d3ba5dd8fb9429a2cf7476e061d061c40c20d8c2
-
SHA512
79917f11c1a5547a0ab4cbe8c48ab92b51e160b79b00e379dc06daab17ee3ff55507a4b20acc702e7bc557f76363bc3982e1bd1b464bf5cdc581db5618e5a27f
-
SSDEEP
12288:wek+VwEZ2Lm1hSQHLDbCPA8Y9JczoB9CI:wdRESuhhwoDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare53b1743df6b607ba17cdad0157fc3e1a
Files
-
VirusShare53b1743df6b607ba17cdad0157fc3e1a.exe windows:5 windows x86 arch:x86
77be065e3e9688d9deec9fb09894d187
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsA
EraseTape
DeleteFileA
CreatePipe
CreateMutexA
CreateFileMappingW
FlushInstructionCache
CreateEventA
CompareFileTime
CloseHandle
CancelTimerQueueTimer
lstrlenA
VirtualAlloc
FormatMessageA
FreeLibrary
GetACP
GetCommandLineA
GetComputerNameA
GetComputerNameW
GetCurrencyFormatA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetLastError
GetProcAddress
GetStartupInfoA
GetStringTypeW
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
lstrlenW
lstrlen
lstrcpyn
lstrcpyW
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualProtectEx
VerSetConditionMask
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetSystemTimeAdjustment
SetLocaleInfoA
SetLastError
SetHandleCount
SetFilePointer
SetEvent
SetEnvironmentVariableA
ScrollConsoleScreenBufferW
ReleaseMutex
ReadFile
QueryPerformanceCounter
OpenMutexA
OpenFile
MultiByteToWideChar
LocalFree
LocalAlloc
LoadLibraryW
LoadLibraryA
GetModuleHandleA
IsDBCSLeadByte
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalGetAtomNameW
GlobalFree
GlobalDeleteAtom
GlobalAlloc
CreateFileA
GlobalAddAtomA
user32
SetScrollPos
SetScrollRange
SetWindowLongA
SetWindowPlacement
SetWindowTextA
SetWindowsHookExA
ShowCursor
ShowScrollBar
ShowWindow
TranslateAcceleratorA
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
WinHelpA
wsprintfA
OpenClipboard
MoveWindow
ModifyMenuA
MessageBoxA
MessageBeep
MapDialogRect
LoadStringW
LoadStringA
LoadCursorA
LoadBitmapA
LoadAcceleratorsA
IsWindow
IsDlgButtonChecked
IsClipboardFormatAvailable
IsCharAlphaNumericA
InvalidateRect
IntersectRect
InflateRect
InSendMessage
GetWindowPlacement
GetWindowLongA
GetWindow
GetSystemMetrics
GetSystemMenu
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetMessageTime
GetMessageA
GetMenuStringA
GetMenuItemCount
GetMenu
GetKeyState
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
SetForegroundWindow
GetClipboardFormatNameW
GetClipboardFormatNameA
GetClipboardData
GetClientRect
FrameRect
FindWindowA
FillRect
EnumDesktopsA
EnumClipboardFormats
EnumChildWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextW
DrawTextA
DrawMenuBar
DrawIcon
DrawFocusRect
DispatchMessageA
DialogBoxParamA
DestroyWindow
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
DdeUninitialize
DdeUnaccessData
DdeSetUserHandle
DdeQueryConvInfo
DdeKeepStringHandle
DdeInitializeA
DdeGetLastError
DdeGetData
DdeFreeStringHandle
DdeFreeDataHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
DdeAccessData
CreateWindowExW
CreateWindowExA
CountClipboardFormats
CopyRect
CloseClipboard
CheckMenuItem
CheckDlgButton
ChangeMenuA
ChangeClipboardChain
BeginPaint
AppendMenuA
AdjustWindowRectEx
SendMessageA
SetFocus
SetDoubleClickTime
SetDlgItemTextA
SetCursor
SetClipboardViewer
SetClipboardData
SetCapture
SendDlgItemMessageA
ScrollWindow
ReleaseDC
ReleaseCapture
RegisterClipboardFormatW
RegisterClipboardFormatA
RegisterClassExW
RegisterClassA
PostQuitMessage
PostMessageA
GetClipboardOwner
PeekMessageA
LoadIconA
IsIconic
gdi32
BitBlt
ColorCorrectPalette
CreateBitmap
CreateBitmapIndirect
CreateDIBitmap
CreateFontA
CreateFontIndirectA
CreatePalette
CreateSolidBrush
DeleteObject
EngCheckAbort
EnumMetaFile
ExcludeClipRect
GetBitmapBits
GetDIBits
GetDeviceCaps
GetEnhMetaFileBits
GetEnhMetaFileHeader
GetMetaFileBitsEx
GetObjectA
GetPaletteEntries
GetPath
GetStockObject
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsA
GetWindowOrgEx
HT_Get8BPPFormatPalette
IntersectClipRect
DeleteEnhMetaFile
PlayEnhMetaFile
PlayMetaFile
PlayMetaFileRecord
PolyTextOutW
RealizePalette
RectVisible
Rectangle
RestoreDC
SaveDC
SelectObject
SelectPalette
SetBkColor
SetBrushOrgEx
SetColorAdjustment
SetDIBitsToDevice
SetEnhMetaFileBits
SetMapMode
SetMetaFileBitsEx
SetStretchBltMode
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
StretchBlt
TextOutA
TextOutW
TranslateCharsetInfo
CreateCompatibleDC
PatBlt
AddFontResourceA
DeleteDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegCreateKeyExA
RegQueryValueExW
RegOpenKeyW
AddAccessAllowedAce
AdjustTokenPrivileges
CloseServiceHandle
EqualSid
GetAce
GetLengthSid
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
GetTokenInformation
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
LookupPrivilegeValueA
MakeSelfRelativeSD
OpenProcessToken
OpenSCManagerA
OpenServiceA
OpenThreadToken
QueryServiceStatus
RegCloseKey
SetSecurityDescriptorDacl
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteA
SHQueryRecycleBinA
SHPathPrepareForWriteA
ExtractAssociatedIconExW
SHAddToRecentDocs
SHGetDataFromIDListA
ShellHookProc
SHGetPathFromIDList
SHGetSpecialFolderPathA
SHLoadNonloadedIconOverlayIdentifiers
shlwapi
StrChrIA
StrCmpNIW
StrCmpNW
StrChrA
StrRStrIA
comctl32
CreateToolbarEx
winmm
timeGetTime
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
exit
sscanf
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.po1 Size: 378KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
e2 Size: 512B - Virtual size: 191B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.po3 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.po5 Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.po1 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.po2 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.po4 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ