Static task
static1
Behavioral task
behavioral1
Sample
ee08bd76e6d181ccd92f83d7d91cd62342e350bd374539a2726513f974c73f81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee08bd76e6d181ccd92f83d7d91cd62342e350bd374539a2726513f974c73f81.exe
Resource
win10v2004-20220812-en
General
-
Target
ee08bd76e6d181ccd92f83d7d91cd62342e350bd374539a2726513f974c73f81
-
Size
3KB
-
MD5
6136bb57ab118c0889e68e59fca087f3
-
SHA1
77b89b0fe45ecb3585a3fbf4fdd604873405ac17
-
SHA256
ee08bd76e6d181ccd92f83d7d91cd62342e350bd374539a2726513f974c73f81
-
SHA512
2c9edf2be1d95de6a89454e78c99abe6bb21ea31224101912ea8c49258e42ac651038378e4bae90cdbc0b0193fb46c5d3e18dcc68193c5d1225721dc31fef5a6
Malware Config
Signatures
Files
-
ee08bd76e6d181ccd92f83d7d91cd62342e350bd374539a2726513f974c73f81.exe windows x86
cb70b6602d893162abc0ed8af3f4e188
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlFreeAnsiString
strncpy
RtlUnicodeStringToAnsiString
ObQueryNameString
IofCompleteRequest
KeDetachProcess
ObfDereferenceObject
ObReferenceObjectByHandle
KeAttachProcess
PsLookupProcessByProcessId
ZwClose
ZwSetInformationProcess
ZwDuplicateToken
ZwOpenProcessToken
ZwOpenProcess
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 201B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 562B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ