Microsoft_WDF_UMDF_Version
Static task
static1
Behavioral task
behavioral1
Sample
87ebf320effa3aa9b748c580d63b61f153972377877e0120bc2fce8d5d36d788.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87ebf320effa3aa9b748c580d63b61f153972377877e0120bc2fce8d5d36d788.exe
Resource
win10v2004-20220812-en
General
-
Target
87ebf320effa3aa9b748c580d63b61f153972377877e0120bc2fce8d5d36d788
-
Size
208KB
-
MD5
0aaa717903c1ac082256a4729cc00800
-
SHA1
06179d5e040224cb2f3cf57b49e62c5df34be069
-
SHA256
87ebf320effa3aa9b748c580d63b61f153972377877e0120bc2fce8d5d36d788
-
SHA512
c5302ba9b2fbfa1d96b441663f1fe755ee72955bfddadfe69f5d4784037a8b692ecc28fe1486f9c6f6aa3dcd2274d82dc12fac46f243271ab296383fb6db125b
-
SSDEEP
3072:JUwIBX1RBlU1y+y8d7WVRXeMSWlmamVDB+1nfY:+w8XrBl+yF8d7eRXD2DBCg
Malware Config
Signatures
Files
-
87ebf320effa3aa9b748c580d63b61f153972377877e0120bc2fce8d5d36d788.exe windows x86
961f20f8432c5c9774749d1604dcf215
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
TraceMessage
UnregisterTraceGuids
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
TraceEvent
ConvertStringSidToSidW
RegSetValueExW
RevertToSelf
kernel32
GetProcAddress
GetModuleHandleW
GetVersionExW
WaitForSingleObject
CloseHandle
TlsFree
GetLastError
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsSetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetSystemDirectoryW
HeapSetInformation
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
CreateThread
LocalFree
CreateEventW
SetEvent
GetOverlappedResult
DeviceIoControl
CreateFileW
SetEnvironmentVariableW
InitializeCriticalSection
InterlockedExchange
BindIoCompletionCallback
FreeLibrary
LoadLibraryExW
GetCurrentProcessId
HeapFree
HeapAlloc
GetProcessHeap
FlushFileBuffers
Sleep
ReadFile
WriteFile
GetCurrentThread
VerifyVersionInfoW
VerSetConditionMask
LocalAlloc
LoadLibraryA
RaiseException
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
RtlCaptureContext
user32
GetSystemMetrics
msvcrt
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_controlfp
_exit
_cexit
__wgetmainargs
wcsncmp
_vsnwprintf
_purecall
memset
memcpy
_vsnprintf
_wcsicmp
_wcsnicmp
_errno
ntdll
DbgPrintEx
RtlNtStatusToDosError
NtQueryInformationFile
RtlUnwind
NtSetInformationFile
rpcrt4
UuidFromStringW
ole32
CoInitializeEx
CLSIDFromString
CoUninitialize
wudfplatform
GetAndInitializePlatformObject
ShutdownPlatformLibrary
WudfWaitForDebugger
WudfDebugBreakPoint
WudfIsUserDebuggerPresent
WdfGetLpcInterface
InitializePlatformLibrary
WudfIsKernelDebuggerPresent
Exports
Exports
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE