Static task
static1
Behavioral task
behavioral1
Sample
e4dc0b5cfb6778cf6d9a36ac7688fd78d743ba0e53045c211fbc1e4912ef9186.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4dc0b5cfb6778cf6d9a36ac7688fd78d743ba0e53045c211fbc1e4912ef9186.exe
Resource
win10v2004-20220812-en
General
-
Target
e4dc0b5cfb6778cf6d9a36ac7688fd78d743ba0e53045c211fbc1e4912ef9186
-
Size
2KB
-
MD5
7ae3e993a78346800ec98adc3e962530
-
SHA1
637b66bd7d439fe7db1a1250e4574139d882dbf6
-
SHA256
e4dc0b5cfb6778cf6d9a36ac7688fd78d743ba0e53045c211fbc1e4912ef9186
-
SHA512
a349f1876a89091cd99e9661262d523cf6b8a357664f0910e7f8ce41bfca4a814659a821a7c9af5b090b5a41a3054802973ebcaa20ed08ab6c4121bd27508524
Malware Config
Signatures
Files
-
e4dc0b5cfb6778cf6d9a36ac7688fd78d743ba0e53045c211fbc1e4912ef9186.exe windows x86
d24c432078fe6596702e8bc864ce9ba3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ