Static task
static1
Behavioral task
behavioral1
Sample
7d14208fbc3e9fc41a2f6c2f377ea78f8f19b37879c059556b6dba54ea18c463.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d14208fbc3e9fc41a2f6c2f377ea78f8f19b37879c059556b6dba54ea18c463.exe
Resource
win10v2004-20220812-en
General
-
Target
7d14208fbc3e9fc41a2f6c2f377ea78f8f19b37879c059556b6dba54ea18c463
-
Size
107KB
-
MD5
5a61daae8bd11eb0758196bd7c59cb80
-
SHA1
25f51c4431f6714d422e066cb4852827d415ec9e
-
SHA256
7d14208fbc3e9fc41a2f6c2f377ea78f8f19b37879c059556b6dba54ea18c463
-
SHA512
c28c8e78886f7fcf0625704ddcf53068fe86e766d185aea6acba7fb74bfb6edfaf6f48115da0434fa40de2370fab5eaff12a56f7a81ba9b0c2edbfd203c0493f
-
SSDEEP
1536:3XdcmpCkfGCtj39qVHw/SXtPzlQXdQO30iVc64kCwcS5U5ED:3mshBqK/kl1qWDpS5U+D
Malware Config
Signatures
Files
-
7d14208fbc3e9fc41a2f6c2f377ea78f8f19b37879c059556b6dba54ea18c463.exe windows x86
1d086c968d2d94cdfc7fe0779139af87
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwOpenKey
RtlInitUnicodeString
wcsstr
_wcsnset
ZwReadFile
ExFreePoolWithTag
ZwQueryInformationFile
ZwCreateFile
ZwWriteFile
RtlCompareString
RtlInitString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
KeServiceDescriptorTable
ZwSetValueKey
ZwCreateKey
IoCreateFile
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
ObReferenceObjectByName
IoDriverObjectType
IoFreeMdl
MmUnlockPages
IoBuildAsynchronousFsdRequest
memset
RtlCompareMemory
ZwQueryValueKey
ZwPulseEvent
ZwAllocateVirtualMemory
ObOpenObjectByPointer
ProbeForRead
IoGetCurrentProcess
strstr
_strupr
PsGetProcessImageFileName
PsLookupProcessByProcessId
_wcsupr
memcpy
PsRemoveLoadImageNotifyRoutine
PsSetLoadImageNotifyRoutine
IoBuildDeviceIoControlRequest
RtlFreeUnicodeString
IoGetDeviceObjectPointer
RtlInitAnsiString
sprintf
RtlAnsiStringToUnicodeString
IoGetConfigurationInformation
KeQuerySystemTime
ZwDeleteFile
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
PsGetVersion
DbgPrint
ExInitializeNPagedLookasideList
IoRegisterShutdownNotification
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
RtlUnwind
ExAllocatePool
ZwClose
InterlockedPushEntrySList
MmIsAddressValid
InterlockedPopEntrySList
hal
KfAcquireSpinLock
KfReleaseSpinLock
KeGetCurrentIrql
KeQueryPerformanceCounter
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ