Static task
static1
Behavioral task
behavioral1
Sample
e4629d489d4a2de2ec0216b58a33ce73685b7038f02188d68f2162a25433c7f9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4629d489d4a2de2ec0216b58a33ce73685b7038f02188d68f2162a25433c7f9.exe
Resource
win10v2004-20220901-en
General
-
Target
e4629d489d4a2de2ec0216b58a33ce73685b7038f02188d68f2162a25433c7f9
-
Size
26KB
-
MD5
6e7e4800eece6b133edfc9f040b7ab90
-
SHA1
19f5755b6379f2436d9e7fdafc8e9d72277132cc
-
SHA256
e4629d489d4a2de2ec0216b58a33ce73685b7038f02188d68f2162a25433c7f9
-
SHA512
cce76bdc843baaa1118ff5071bdabba91f544f87881af064e08776b49645aa99d33c17954c4bbc48749f6eca9e5be4d1b1594160b5bdfe17cd7da5e382a6aad5
-
SSDEEP
768:J+j7l7l7l7l7l7l7F7U0JJkxZDFG7NhdL/xi65MiD69e:JP5qhd7xi65Mi
Malware Config
Signatures
Files
-
e4629d489d4a2de2ec0216b58a33ce73685b7038f02188d68f2162a25433c7f9.exe windows x86
af07103243a2c72375dfa9757bef1d76
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoGetCurrentProcess
_stricmp
_strlwr
RtlFreeAnsiString
strncpy
RtlUnicodeStringToAnsiString
KeServiceDescriptorTable
ZwCreateFile
ZwPulseEvent
IoCreateSymbolicLink
IoCreateDevice
ZwQuerySystemInformation
RtlInitUnicodeString
MmUserProbeAddress
_except_handler3
ExFreePool
strrchr
ExAllocatePoolWithTag
IofCompleteRequest
ObReferenceObjectByHandle
RtlFreeUnicodeString
IoCreateFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IoFreeIrp
KeSetEvent
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
IoAllocateIrp
IoGetRelatedDeviceObject
IoFileObjectType
strncmp
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.codet Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code1 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code2 Size: 448B - Virtual size: 445B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 864B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 640B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s2data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s1data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sosata2 Size: 32B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sosata1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ESTisb Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 946B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ