Static task
static1
Behavioral task
behavioral1
Sample
f153507ab132e93471d9c549da606a67d912f5a143635eaccd583cddb79b29bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f153507ab132e93471d9c549da606a67d912f5a143635eaccd583cddb79b29bf.exe
Resource
win10v2004-20220812-en
General
-
Target
f153507ab132e93471d9c549da606a67d912f5a143635eaccd583cddb79b29bf
-
Size
18KB
-
MD5
66ec3a4b48b489220de262abbd0e5faf
-
SHA1
7ec359d721f634cd176e1c83da8b20ef96f21beb
-
SHA256
f153507ab132e93471d9c549da606a67d912f5a143635eaccd583cddb79b29bf
-
SHA512
ab6ec3112a8d3889107af3e6a629c87d535774d72185a710c93fcd0334393d7f3df9f64cd0763d1e7be93180f7784ec91c7583e5b82391ea988fbc40a244f240
-
SSDEEP
384:DHJ9v3EyuvymGtyShEwkwUqXLKnyYMepQH0PBGZui2eMwHbZ7wvVF4N09z3b71+I:TTCGy+UV76U
Malware Config
Signatures
Files
-
f153507ab132e93471d9c549da606a67d912f5a143635eaccd583cddb79b29bf.exe windows x86
e890af971ff32086787261dce5e980ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ProbeForRead
_except_handler3
_stricmp
IofCompleteRequest
PsGetCurrentProcessId
_strupr
IoGetCurrentProcess
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
ProbeForWrite
ExAllocatePoolWithTag
ZwPulseEvent
MmGetSystemRoutineAddress
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
ZwQuerySystemInformation
ZwQueryInformationProcess
strncmp
IoDeleteDevice
IoDeleteSymbolicLink
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
MmSizeOfMdl
PsTerminateSystemThread
MmIsAddressValid
ExFreePool
ExGetPreviousMode
hal
KfReleaseSpinLock
KfAcquireSpinLock
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zcata Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
vcata Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 992B - Virtual size: 992B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 378B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ