Static task
static1
Behavioral task
behavioral1
Sample
388b3b12124ee21366503b0731065174c839e349139b73dc46fc2f45b9483b62.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
388b3b12124ee21366503b0731065174c839e349139b73dc46fc2f45b9483b62.exe
Resource
win10v2004-20220812-en
General
-
Target
388b3b12124ee21366503b0731065174c839e349139b73dc46fc2f45b9483b62
-
Size
76KB
-
MD5
43b5405cf96a0bdc76f72f110d7007d0
-
SHA1
1f3f756374b8aaa32e105ba1cfacb73e9fa786dc
-
SHA256
388b3b12124ee21366503b0731065174c839e349139b73dc46fc2f45b9483b62
-
SHA512
5fcd0dcf7878b501a9266d15a77ae3bfe3fdacb75dd86067c4d13c19ab58b4276e039c37f6206708d83871d7bebe841e14d09e7de921d6980cdcabdc31831c0f
-
SSDEEP
1536:Tcaz9Vi5mlcFn12CCWu+CaK2dFBDz49aurrsGo5YlW/u1:HDi0lcBcCCWjCl2jB3cpr4ZC
Malware Config
Signatures
Files
-
388b3b12124ee21366503b0731065174c839e349139b73dc46fc2f45b9483b62.exe windows x86
d8a81d7519b63c110888b1e9bd284df2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeUnstackDetachProcess
KeStackAttachProcess
IofCompleteRequest
PoCallDriver
PoStartNextPowerIrp
IoDeleteDevice
IoAttachDeviceToDeviceStack
IoCreateDevice
ObfReferenceObject
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoCreateFile
memcpy
IoGetCurrentProcess
IofCallDriver
IoAttachDevice
_purecall
ExFreePoolWithTag
_stricmp
KeGetCurrentThread
KeWaitForSingleObject
IoAllocateIrp
KeClearEvent
IoFileObjectType
strcmp
strncat
NtQuerySystemInformation
ZwClose
KeServiceDescriptorTable
MmIsAddressValid
sprintf
KeBugCheckEx
PsGetVersion
IoBuildDeviceIoControlRequest
KeInitializeEvent
memset
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlCopyUnicodeString
MmGetSystemRoutineAddress
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlQueryRegistryValues
IoRegisterShutdownNotification
KeSetPriorityThread
PsCreateSystemThread
RtlUnicodeStringToInteger
RtlTimeToTimeFields
_allmul
RtlWriteRegistryValue
RtlCreateRegistryKey
swprintf
RtlDeleteRegistryValue
ObQueryNameString
IoFreeIrp
ObInsertObject
SeSetAccessStateGenericMapping
RtlMapGenericMask
SeCreateAccessState
ObCreateObject
IoFreeMdl
MmUnlockPages
IoCancelIrp
MmProbeAndLockPages
IoAllocateMdl
KeWaitForMultipleObjects
KeResetEvent
KeNumberProcessors
_aulldiv
RtlAnsiStringToUnicodeString
RtlInitAnsiString
KeTickCount
ExAllocatePoolWithTag
RtlInitUnicodeString
IoDriverObjectType
ObReferenceObjectByName
KeSetEvent
ObfDereferenceObject
strncpy
wcsncpy
strlen
RtlCompareMemory
ZwReadFile
ZwWriteFile
KeQuerySystemTime
strchr
wcschr
RtlUnwind
hal
KfReleaseSpinLock
KfLowerIrql
KfRaiseIrql
KeGetCurrentIrql
KfAcquireSpinLock
Sections
page Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ