Static task
static1
Behavioral task
behavioral1
Sample
095e3200bbb1a2a1f4abc5accd7e949daaab1a18d69223bc11c09da546c1766d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
095e3200bbb1a2a1f4abc5accd7e949daaab1a18d69223bc11c09da546c1766d.exe
Resource
win10v2004-20220901-en
General
-
Target
095e3200bbb1a2a1f4abc5accd7e949daaab1a18d69223bc11c09da546c1766d
-
Size
40KB
-
MD5
a138c9f009f78f438795a1289cbd78f0
-
SHA1
20c4d3d7d6a08bba60881f98323048bc3e710c96
-
SHA256
095e3200bbb1a2a1f4abc5accd7e949daaab1a18d69223bc11c09da546c1766d
-
SHA512
2678c75970bec5983d00398d871d702de1115890ad71b06da763914ae2f95ef71ddde6e45afa112625b707ec35969376fc54e1810c90ca25c48280fc8124acc6
-
SSDEEP
768:5Qcd1KfOP71PNClLwjhCKoEycaeZYMgpzoAlFOB2Lsjf1tHgfEjqdzGubsYu/YCX:J714McWZtg5oAmOsjbAfS61sYDC1yzS
Malware Config
Signatures
Files
-
095e3200bbb1a2a1f4abc5accd7e949daaab1a18d69223bc11c09da546c1766d.exe windows x86
ce0c1d86a4c2a2b959b7b95d589c26af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
PsCreateSystemThread
ExFreePool
ExAllocatePoolWithTag
ObfDereferenceObject
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
ZwSetValueKey
ZwCreateKey
ObReferenceObjectByHandle
_snwprintf
wcsncpy
wcslen
wcschr
wcsstr
_wcslwr
_snprintf
_wcsicmp
_except_handler3
ZwCreateFile
swprintf
strncpy
PsLookupProcessByProcessId
_stricmp
wcscat
wcscpy
ZwDeleteKey
MmIsAddressValid
wcsrchr
strncmp
KeQuerySystemTime
IoGetCurrentProcess
PsGetVersion
IoDeviceObjectType
_wcsnicmp
KeDelayExecutionThread
RtlAnsiStringToUnicodeString
IofCompleteRequest
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IoRegisterDriverReinitialization
RtlCompareUnicodeString
MmGetSystemRoutineAddress
PsSetCreateProcessNotifyRoutine
ZwSetInformationFile
RtlCopyUnicodeString
KeTickCount
KeQueryTimeIncrement
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 73B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ