Static task
static1
Behavioral task
behavioral1
Sample
2369d52a7ccf7fa9ec04f59132783407117b307955e84789ede61dea14e79e4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2369d52a7ccf7fa9ec04f59132783407117b307955e84789ede61dea14e79e4c.exe
Resource
win10v2004-20220812-en
General
-
Target
2369d52a7ccf7fa9ec04f59132783407117b307955e84789ede61dea14e79e4c
-
Size
8KB
-
MD5
0ad9295a266db3af01fb531f1da36690
-
SHA1
1fe5e379434e1c508aa0e561f1f0b2a64ff249ef
-
SHA256
2369d52a7ccf7fa9ec04f59132783407117b307955e84789ede61dea14e79e4c
-
SHA512
3694ab9fed49c1ceb8bd0d76ac9b5100981c9b7e1f3bfff0c9e8c8b89e0166285d093d0e4d914e5ec09f5ef0d7e7681ed74ea6bfaaccf8c59b575dc9641da0f0
-
SSDEEP
192:jMFlXhZK/gigVNGddU1i0MpJyFZmBj8gR0hu/STvZ0:QF9zKYTGEMpiZmBj8I0hu8vZ0
Malware Config
Signatures
Files
-
2369d52a7ccf7fa9ec04f59132783407117b307955e84789ede61dea14e79e4c.exe windows x86
e10361e60472ca033b6157b0d162aa42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
ExAllocatePoolWithTag
ExFreePoolWithTag
RtlInitUnicodeString
MmMapLockedPagesSpecifyCache
memset
ZwCreateKey
IoDeleteSymbolicLink
IoDeleteDevice
swprintf
ZwSetValueKey
ZwClose
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
ObReferenceObjectByHandle
ObfDereferenceObject
ZwOpenKey
PsTerminateSystemThread
ObReferenceObjectByPointer
_except_handler3
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 496B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 624B - Virtual size: 612B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 352B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ