Static task
static1
Behavioral task
behavioral1
Sample
01ce22e287da65c3d10bf164a3843db2dca67a502151796d9c49e691e2cbf699.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01ce22e287da65c3d10bf164a3843db2dca67a502151796d9c49e691e2cbf699.exe
Resource
win10v2004-20220901-en
General
-
Target
01ce22e287da65c3d10bf164a3843db2dca67a502151796d9c49e691e2cbf699
-
Size
79KB
-
MD5
65066d2248bd32144a167a9cca254ad8
-
SHA1
e54ffcdfe33d6718604743a510742ef248ebcba1
-
SHA256
01ce22e287da65c3d10bf164a3843db2dca67a502151796d9c49e691e2cbf699
-
SHA512
ca1f67a131da8f89d775cf7ed9550b47736be82c0911e5f8e054641c99f0eba6a67f41225c447aa6ea77f5c6fe5866623af2c09ebc31cef98e5a1d51850683b9
-
SSDEEP
1536:FVevzXWyO7SF+q+yZ3wWYgZ2A1dAyQ8TWTCqN/jlQ/lbx:6mkGG3w3gR1dAyfTWT1/4lbx
Malware Config
Signatures
Files
-
01ce22e287da65c3d10bf164a3843db2dca67a502151796d9c49e691e2cbf699.exe windows x86
5a60667bdb3900794b5ab81c0bb0e16e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
PoCallDriver
PoStartNextPowerIrp
IoDeleteDevice
IoAttachDeviceToDeviceStack
IoCreateDevice
ObfReferenceObject
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoCreateFile
memcpy
IofCallDriver
IoAttachDevice
_purecall
IoGetCurrentProcess
ExFreePoolWithTag
_stricmp
KeGetCurrentThread
KeWaitForSingleObject
IoAllocateIrp
KeClearEvent
IoFileObjectType
strcmp
strncat
NtQuerySystemInformation
ZwClose
KeServiceDescriptorTable
MmIsAddressValid
sprintf
KeBugCheckEx
PsGetVersion
IoBuildDeviceIoControlRequest
KeInitializeEvent
KeSetEvent
memset
RtlCompareUnicodeString
RtlCopyUnicodeString
MmGetSystemRoutineAddress
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlQueryRegistryValues
IoRegisterShutdownNotification
KeSetPriorityThread
PsCreateSystemThread
RtlUnicodeStringToInteger
RtlTimeToTimeFields
_allmul
RtlWriteRegistryValue
RtlCreateRegistryKey
swprintf
RtlDeleteRegistryValue
ObQueryNameString
IoFreeIrp
ObInsertObject
SeSetAccessStateGenericMapping
RtlMapGenericMask
SeCreateAccessState
ObCreateObject
IoFreeMdl
MmUnlockPages
IoCancelIrp
MmProbeAndLockPages
IoAllocateMdl
KeWaitForMultipleObjects
KeResetEvent
KeNumberProcessors
_aulldiv
RtlAnsiStringToUnicodeString
RtlInitAnsiString
KeTickCount
ExAllocatePoolWithTag
RtlInitUnicodeString
IoDriverObjectType
ObReferenceObjectByName
RtlFreeUnicodeString
ObfDereferenceObject
strncpy
wcsncpy
strlen
RtlCompareMemory
ZwReadFile
ZwWriteFile
KeQuerySystemTime
strchr
wcschr
RtlUnwind
hal
KfReleaseSpinLock
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
KfAcquireSpinLock
Sections
page Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ