Static task
static1
Behavioral task
behavioral1
Sample
c2ee2288988b237638ac847d0753bd84bb37d9aca2474978184b755d49550a70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2ee2288988b237638ac847d0753bd84bb37d9aca2474978184b755d49550a70.exe
Resource
win10v2004-20220812-en
General
-
Target
c2ee2288988b237638ac847d0753bd84bb37d9aca2474978184b755d49550a70
-
Size
617KB
-
MD5
afc44325aee1e179fbb9b61fad42487a
-
SHA1
93e9747d95c20c786213bad03ba52122516bdb6e
-
SHA256
c2ee2288988b237638ac847d0753bd84bb37d9aca2474978184b755d49550a70
-
SHA512
f3efc0af6ac9a902461adc797d053be3e95de0886c272d5c14e7a7a17dbebef0101d0bdbcedd29fd770f7887ee4691c1684acaf42925e2e14d9740db24726d2b
-
SSDEEP
6144:7ruW3inIjqZ/EAGRM4Z7L4f1ZNErBoECkZmnJwjYMWFlhjcHHHgDEG2780pR8Win:2wiIEGwf7n//DapyGAou2sI6tm/40SEy
Malware Config
Signatures
Files
-
c2ee2288988b237638ac847d0753bd84bb37d9aca2474978184b755d49550a70.exe windows x86
4104ac4d4c7a61370a51351c340b54b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoRegisterShutdownNotification
IoCreateSymbolicLink
IoCreateDevice
KeInitializeMutex
_vsnwprintf
KeDelayExecutionThread
_allmul
ZwClose
ZwWriteFile
IoCreateFile
ZwDeleteFile
KeTickCount
KeQueryTimeIncrement
_alldiv
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ObfDereferenceObject
ObReferenceObjectByHandle
IoFileObjectType
ZwOpenKey
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwEnumerateKey
memcpy
memset
ZwDeleteKey
RtlCopyUnicodeString
ObOpenObjectByPointer
PsProcessType
PsLookupProcessByProcessId
MmGetSystemRoutineAddress
ZwTerminateProcess
ZwOpenProcess
ZwOpenFile
ZwCreateKey
ZwSetValueKey
ZwFlushKey
ExAllocatePool
ZwQueryKey
ZwQueryValueKey
_wcsicmp
ZwQuerySystemInformation
ZwLoadDriver
KeQuerySystemTime
_vsnprintf
IoRegisterDriverReinitialization
_strnicmp
strstr
MmIsAddressValid
KeInitializeEvent
IofCallDriver
IoBuildDeviceIoControlRequest
IoGetRelatedDeviceObject
IoFreeMdl
MmUnlockPages
MmProbeAndLockPages
IoAllocateMdl
IoGetDeviceAttachmentBaseRef
IoFreeIrp
KeSetEvent
IoAllocateIrp
PsTerminateSystemThread
PsGetCurrentThreadId
KeReleaseMutex
PsLookupThreadByThreadId
PsCreateSystemThread
RtlCompareMemory
ZwSetInformationFile
KeGetCurrentThread
wcsstr
RtlCompareString
RtlInitString
ZwMapViewOfSection
ZwCreateSection
KeServiceDescriptorTable
ProbeForRead
KeUnstackDetachProcess
KeStackAttachProcess
_wcslwr
PsSetCreateProcessNotifyRoutine
InterlockedPopEntrySList
ExInitializeNPagedLookasideList
ObQueryNameString
CmRegisterCallback
SeCreateAccessState
IoGetFileObjectGenericMapping
ObCreateObject
KeClearEvent
IoGetAttachedDevice
KeBugCheckEx
IofCompleteRequest
KeWaitForSingleObject
RtlInitUnicodeString
strncpy
RtlGetVersion
RtlUnwind
hal
KfReleaseSpinLock
KfAcquireSpinLock
KeGetCurrentIrql
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 896B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ