Static task
static1
Behavioral task
behavioral1
Sample
b2df5dd8463a859223b54af32e8cf9fb2da14f1c3760b4c3193a52085a1fa4dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b2df5dd8463a859223b54af32e8cf9fb2da14f1c3760b4c3193a52085a1fa4dc.exe
Resource
win10v2004-20220812-en
General
-
Target
b2df5dd8463a859223b54af32e8cf9fb2da14f1c3760b4c3193a52085a1fa4dc
-
Size
118KB
-
MD5
49e57b40fe4584552cd83cc881844dc7
-
SHA1
64541b9b1f23e644f75f9b67f433aa72fb1ce6ad
-
SHA256
b2df5dd8463a859223b54af32e8cf9fb2da14f1c3760b4c3193a52085a1fa4dc
-
SHA512
67aff0b07ccfe10d73b86db59870c2227b5e0cbbc3ac4614d3375e11de616e0723abb6e92c9a21364d44dad900c83e7d89fa419979ac9d6107cec23e7fc008fe
-
SSDEEP
1536:97rsFKymlHWWE2lOCrD+qozSP4VY4tDrg76Bk:ZryuVYBz5Vxrg7
Malware Config
Signatures
Files
-
b2df5dd8463a859223b54af32e8cf9fb2da14f1c3760b4c3193a52085a1fa4dc.exe windows x86
d3ac47d5acb66133eb98042bbe0cf5d8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmMapLockedPagesSpecifyCache
PsTerminateSystemThread
RtlCompareMemory
ZwClose
ObfDereferenceObject
KeWaitForSingleObject
KeSetEvent
KeDelayExecutionThread
IofCompleteRequest
ExAllocatePoolWithTag
PsGetCurrentProcessId
PsSetLoadImageNotifyRoutine
KeInitializeEvent
RtlImageNtHeader
ExAllocatePool
atoi
strlen
wcscmp
IoGetLowerDeviceObject
IoCreateFile
PsGetVersion
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
wcslen
ExInitializeResourceLite
ObReferenceObjectByHandle
PsCreateSystemThread
RtlRandom
KeTickCount
KeQuerySystemTime
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
_stricmp
ZwQueryInformationFile
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
IofCallDriver
IoBuildDeviceIoControlRequest
ZwFsControlFile
ZwQueryVolumeInformationFile
_allmul
_alldiv
ZwSetInformationFile
ZwReadFile
IoGetRelatedDeviceObject
IoFreeIrp
_except_handler3
RtlImageDirectoryEntryToData
memcpy
IoGetCurrentProcess
KeLeaveCriticalRegion
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
KeEnterCriticalRegion
MmHighestUserAddress
strcpy
ZwQuerySystemInformation
ZwQueryInformationProcess
RtlEqualUnicodeString
strcmp
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
ZwQueryObject
wcscat
_alloca_probe
KeRevertToUserAffinityThread
KeSetSystemAffinityThread
KeQueryActiveProcessors
IoAllocateIrp
KeInsertQueueApc
KeInitializeApc
ZwAllocateVirtualMemory
PsGetProcessImageFileName
_wcsupr
ObMakeTemporaryObject
ObfReferenceObject
strcat
strncpy
strstr
IoFileObjectType
strchr
MmIsAddressValid
PsGetCurrentThreadId
FsRtlIsNameInExpression
PsLookupThreadByThreadId
memset
KeGetCurrentThread
ExFreePoolWithTag
hal
KfReleaseSpinLock
KfAcquireSpinLock
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ