Static task
static1
Behavioral task
behavioral1
Sample
3d248a55dafad5275a459cffd3baecd551709df919e6cf268e682b05fe9a6637.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d248a55dafad5275a459cffd3baecd551709df919e6cf268e682b05fe9a6637.exe
Resource
win10v2004-20220901-en
General
-
Target
3d248a55dafad5275a459cffd3baecd551709df919e6cf268e682b05fe9a6637
-
Size
21KB
-
MD5
60f7941be26ca86ecffec6b7be348d50
-
SHA1
ef2684860e67525cec28d18105f60e9272cc7a06
-
SHA256
3d248a55dafad5275a459cffd3baecd551709df919e6cf268e682b05fe9a6637
-
SHA512
66439a39ee4aa12b920719c99a7b7bcda365cb8d0126a916efb8a58402201f1d4d744de4c5d9f0575e516c7f4c2802679de8b48b88ffd158f52fee0dc2ac5863
-
SSDEEP
192:YZein+/1ev0N2bs7ZtyqrFqhHjkJOHS6EMDHBRJvwu:NM+ce2bOtyq5E24EMLGu
Malware Config
Signatures
Files
-
3d248a55dafad5275a459cffd3baecd551709df919e6cf268e682b05fe9a6637.exe windows x86
0aacc2b50ecc7315cd3ce4d862d7e57d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 67B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 716B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 480B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ