Static task
static1
Behavioral task
behavioral1
Sample
84093786f235bc9453171add88ce8037a7caa7468d616675939ff78558d75401.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84093786f235bc9453171add88ce8037a7caa7468d616675939ff78558d75401.exe
Resource
win10v2004-20220812-en
General
-
Target
84093786f235bc9453171add88ce8037a7caa7468d616675939ff78558d75401
-
Size
4KB
-
MD5
247012f2deea54d1c3b455b880a7ecd0
-
SHA1
ba32ecd701b7a2ea90c5437b69b2c9b77cbdcfec
-
SHA256
84093786f235bc9453171add88ce8037a7caa7468d616675939ff78558d75401
-
SHA512
195625ceeba0fb57ba79427af85ec2327b70b78adafdd0fa9da1e6fea65f81c1f0140086137afc2afb774e31d589424d01a9aff55939d9dfa52c145a259b75cb
-
SSDEEP
48:4qGhgV5rc76uvF4zv3B4JS52xGHHZaedj0s1lI0INtiw+6pbTguLRIRyF6ga:7G2xcGiySJSUxoF05vXplL+E63
Malware Config
Signatures
Files
-
84093786f235bc9453171add88ce8037a7caa7468d616675939ff78558d75401.exe windows x86
a0023ebada3f3276ae70f47857e205ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
DbgPrint
IofCompleteRequest
PsLookupProcessByProcessId
MmMapLockedPagesSpecifyCache
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 896B - Virtual size: 878B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 768B - Virtual size: 703B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 712B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ