Static task
static1
Behavioral task
behavioral1
Sample
3f494bdf8a33110044a0e9de22570c98f15f5ff876f463e3cb5808d6468948ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f494bdf8a33110044a0e9de22570c98f15f5ff876f463e3cb5808d6468948ca.exe
Resource
win10v2004-20220812-en
General
-
Target
3f494bdf8a33110044a0e9de22570c98f15f5ff876f463e3cb5808d6468948ca
-
Size
5KB
-
MD5
8456158a464f0d1fcc3f1cd87637ae7b
-
SHA1
61dfab2519435067cf7a7f08f1ade5d2506e84b3
-
SHA256
3f494bdf8a33110044a0e9de22570c98f15f5ff876f463e3cb5808d6468948ca
-
SHA512
3c77755aebb74819f7c7dc9885334b68fddee10c1e171e5bd7af98f469dea1984b180748da1403bf3befddd44d32ee0e2ff68346c8dd9475ca17f8abe54f29a1
-
SSDEEP
96:cI42FlgcA4sHndetl/cr1gDnMXRG1qqdBtK/KEk/8gq08Vq:Pfngc5ueEKDnMXRG1F+C/8gqs
Malware Config
Signatures
Files
-
3f494bdf8a33110044a0e9de22570c98f15f5ff876f463e3cb5808d6468948ca.exe windows x86
790a705bb6e01a5ec06e60aeca34cb54
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
DbgPrint
ExFreePoolWithTag
KeUnstackDetachProcess
ProbeForRead
KeStackAttachProcess
ExAllocatePoolWithTag
PsLookupProcessByProcessId
_except_handler3
ProbeForWrite
MmIsAddressValid
IoDeleteDevice
IoDeleteSymbolicLink
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeTickCount
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 554B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ