Static task
static1
Behavioral task
behavioral1
Sample
6838d14b75997f9d05b60b9faa022044f42a63dcd16e9699f12e5b3336ddf673.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6838d14b75997f9d05b60b9faa022044f42a63dcd16e9699f12e5b3336ddf673.exe
Resource
win10v2004-20220812-en
General
-
Target
6838d14b75997f9d05b60b9faa022044f42a63dcd16e9699f12e5b3336ddf673
-
Size
3KB
-
MD5
0acc284362c72be95c3c8778c975d5a0
-
SHA1
a748ee8aec89b3cbbad601a296f9d3a792a6bbbf
-
SHA256
6838d14b75997f9d05b60b9faa022044f42a63dcd16e9699f12e5b3336ddf673
-
SHA512
a4062aa677d2acc26fcad08663c035aa6b8c242324f56ddacaf823648fa5c3a7708998284f93664975f36669152bd88e5c9312c111346eaa91d43ea77231936e
Malware Config
Signatures
Files
-
6838d14b75997f9d05b60b9faa022044f42a63dcd16e9699f12e5b3336ddf673.exe windows x86
cb70b6602d893162abc0ed8af3f4e188
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlFreeAnsiString
strncpy
RtlUnicodeStringToAnsiString
ObQueryNameString
IofCompleteRequest
KeDetachProcess
ObfDereferenceObject
ObReferenceObjectByHandle
KeAttachProcess
PsLookupProcessByProcessId
ZwClose
ZwSetInformationProcess
ZwDuplicateToken
ZwOpenProcessToken
ZwOpenProcess
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 189B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 562B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ