Static task
static1
Behavioral task
behavioral1
Sample
beaa22d90e3329c0f6b5811c22ed8a8f32b55b34afbecedad52d6ffa9acbff23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
beaa22d90e3329c0f6b5811c22ed8a8f32b55b34afbecedad52d6ffa9acbff23.exe
Resource
win10v2004-20220812-en
General
-
Target
beaa22d90e3329c0f6b5811c22ed8a8f32b55b34afbecedad52d6ffa9acbff23
-
Size
102KB
-
MD5
6d624d05a91cb4f5573ef597691741a0
-
SHA1
be21d8588c3ede64995fa9f8701e46d787e7eb23
-
SHA256
beaa22d90e3329c0f6b5811c22ed8a8f32b55b34afbecedad52d6ffa9acbff23
-
SHA512
269c92f54382dfe32c604538536e06ebee81298e97c0dfca4dc4d32993220c5e8184618387ddec7c28322383e891e8b73c1972f995fa407ff6cfb4640fd0a561
-
SSDEEP
1536:RHZrGCtVNJMC+axUshl4wKPTtgzLuD3UBQMP6+5iK:XvhMUwPTtgqyj5r
Malware Config
Signatures
Files
-
beaa22d90e3329c0f6b5811c22ed8a8f32b55b34afbecedad52d6ffa9acbff23.exe windows x86
93365491074b38925ddd1482d990b3ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_strnset
memcpy
ExAllocatePool
strstr
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
wcsstr
_wcsnset
ZwReadFile
ExFreePoolWithTag
ZwQueryInformationFile
ZwCreateFile
ZwWriteFile
RtlCompareString
RtlInitString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
KeServiceDescriptorTable
ZwSetValueKey
ZwCreateKey
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetDeviceObjectPointer
ObReferenceObjectByName
atoi
IoFreeIrp
KeSetEvent
IoFreeMdl
MmUnlockPages
IoBuildAsynchronousFsdRequest
memset
MmIsAddressValid
ZwPulseEvent
ZwAllocateVirtualMemory
ObOpenObjectByPointer
ProbeForRead
IoGetCurrentProcess
_strupr
PsGetProcessImageFileName
PsLookupProcessByProcessId
_wcsupr
PsRemoveLoadImageNotifyRoutine
PsSetLoadImageNotifyRoutine
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
PsGetVersion
DbgPrint
IoRegisterShutdownNotification
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
RtlUnwind
IoDriverObjectType
strchr
hal
KeGetCurrentIrql
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ