Sample viewer

vx.netlux.org/Virus.DOS.Jerusalem.Scott.1716.b

.

GIF

Syscalls:

Time Syscall Op Syscall Name
2018-12-17T23:01:51.198568829Z 192 PC: 12a63 | UNKNOWN!
2018-12-17T23:01:51.211606742Z 192 PC: 12ad7 | UNKNOWN!
2018-12-17T23:01:51.214116254Z 74 PC: 12bca | Reallocate memory
2018-12-17T23:01:51.216667129Z 53 PC: 12bcf | Get interrupt vector (Interrupt = '33' AKA 'Random read')
2018-12-17T23:01:51.218581274Z 37 PC: 12be3 | Set interrupt vector (Interrupt = '33' AKA 'Random read')
2018-12-17T23:01:51.222355355Z 42 PC: 130a3 | Get date 0x130a3: mov byte ptr [bp - 6], dh
0x130a6: mov byte ptr [bp - 8], dl
0x130a9: mov byte ptr [bp - 5], 0
0x130ad: mov byte ptr [bp - 7], 0
0x130b1: mov di, cx
0x130b3: sub di, 0x7b2
0x130b7: mov ax, 0x16d
0x130ba: mul di
0x130bc: mov si, ax
0x130be: add di, 2
0x130c1: test di, 3
0x130c5: jne 0x130d0
0x130c7: cmp word ptr [bp - 6], 2
0x130cb: ja 0x130d0
0x130cd: sub di, 4
0x130d0: mov ax, di
0x130d2: shr ax, 1
0x130d4: shr ax, 1
0x130d6: add si, ax
0x130d8: mov bx, word ptr [bp - 6]
2018-12-17T23:01:51.225409736Z 42 PC: 12c32 | Get date 0x12c32: mov byte ptr cs:[0xeb], 0
0x12c38: cmp cx, 0x7c7
0x12c3c: jb 0x12c47
0x12c3e: cmp al, 5
0x12c40: jne 0x12c47
0x12c42: inc byte ptr cs:[0xeb]
0x12c47: pop dx
0x12c48: pop cx
0x12c49: pop bx
0x12c4a: pop ax
0x12c4b: pop es
0x12c4c: pop ds
0x12c4d: pushf
0x12c4e: lcall ptr cs:[0xf3]
0x12c53: push ds
0x12c54: pop es
0x12c55: mov ah, 0x49
0x12c57: int 0x21
0x12c59: mov ah, 0x4d
0x12c5b: int 0x21
2018-12-17T23:01:51.228307618Z 75 PC: 12c53 | Execute program
2018-12-17T23:01:51.269575976Z 76 PC: 15b5d | Terminate with return code (Return code = '0')
2018-12-17T23:01:51.27305095Z 73 PC: 12c59 | Release memory
2018-12-17T23:01:51.274753594Z 77 PC: 12c5d | Get program return code
2018-12-17T23:01:51.277484912Z 49 PC: 12c6b | Terminate and stay resident (Return code = '0' | Memory size = '124')