Static task
static1
Behavioral task
behavioral1
Sample
bcace459a4ae23839c930cb39dab6661d0581953076679637b6d6fb95711edd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcace459a4ae23839c930cb39dab6661d0581953076679637b6d6fb95711edd2.exe
Resource
win10v2004-20220901-en
General
-
Target
bcace459a4ae23839c930cb39dab6661d0581953076679637b6d6fb95711edd2
-
Size
8KB
-
MD5
118f92f140ff320db04923ba1ba03c80
-
SHA1
542315a6720f041698d4b072fb559fb34ebdbdd9
-
SHA256
bcace459a4ae23839c930cb39dab6661d0581953076679637b6d6fb95711edd2
-
SHA512
f62dd8207965802c0c949c85583bb0715f1ef7d991a3319481efd3f73abeb0204465bd5ba7ad777f7c70e0aafcb4d5027f81006d3531dcde785d5653f824a239
-
SSDEEP
192:Br9S+dG3Y2xeAsNDX7meMZ7gFK0Y3Qe/9q:F8iG3BBsNDrmeMZ730Yge/0
Malware Config
Signatures
Files
-
bcace459a4ae23839c930cb39dab6661d0581953076679637b6d6fb95711edd2.exe windows x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ