Static task
static1
Behavioral task
behavioral1
Sample
79cfa35d3235904a427c10bbf0444cb4fd267476b734a5813c3b22a17a044c02.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
79cfa35d3235904a427c10bbf0444cb4fd267476b734a5813c3b22a17a044c02.exe
Resource
win10v2004-20220901-en
General
-
Target
79cfa35d3235904a427c10bbf0444cb4fd267476b734a5813c3b22a17a044c02
-
Size
160KB
-
MD5
22a92df3a393dda577ad554315e797b0
-
SHA1
a67c489398030a06c70c75a7bf7a5916f2d6c8de
-
SHA256
79cfa35d3235904a427c10bbf0444cb4fd267476b734a5813c3b22a17a044c02
-
SHA512
f04af989f9cdfb81e73506b44bd60470b85800d9b53aefab737d323b65876d9a1681f51d4730cddac1745fce6b398fc81c0abca01c5b7a2dff5d98f8f0ead742
-
SSDEEP
3072:2I2UCGNbtpom07Z8d4ybmHHgUiWe6Tl6QJxZ7ihAYlHvKbKv9ES:BNHom0E6HmOUPKbS9ES
Malware Config
Signatures
Files
-
79cfa35d3235904a427c10bbf0444cb4fd267476b734a5813c3b22a17a044c02.exe windows x86
3b7a8ebfdc0251dfef3025c6e38aa7fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_allmul
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ZwClose
ZwSetValueKey
ZwCreateKey
ExFreePoolWithTag
ZwQueryValueKey
ExAllocatePool
ZwOpenKey
memset
ZwDeleteValueKey
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwSetInformationFile
ZwQueryInformationFile
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
ZwQuerySystemInformation
RtlUnicodeStringToInteger
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwEnumerateKey
isspace
atoi
strstr
ZwCreateSection
strncpy
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
ObfDereferenceObject
IoAttachDeviceToDeviceStack
KeDelayExecutionThread
IoGetDeviceObjectPointer
IoDetachDevice
IofCallDriver
RtlCompareMemory
_alldiv
ObReferenceObjectByHandle
KeSetEvent
KeWaitForSingleObject
KeInitializeEvent
ExAllocatePoolWithTag
IoFreeMdl
MmBuildMdlForNonPagedPool
IoAllocateMdl
MmMapLockedPagesSpecifyCache
_except_handler3
atol
KeResetEvent
KeWaitForMultipleObjects
PsTerminateSystemThread
PsCreateSystemThread
ObfReferenceObject
IoBuildDeviceIoControlRequest
IoGetRelatedDeviceObject
MmProbeAndLockPages
IoFreeIrp
IoAllocateIrp
IoCancelIrp
ZwQueryObject
ZwDuplicateObject
NtOpenProcess
RtlCompareUnicodeString
ZwWaitForSingleObject
ZwDeviceIoControlFile
ZwCreateEvent
ZwQueryDefaultLocale
PsGetVersion
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
ZwFsControlFile
KeSetPriorityThread
KeGetCurrentThread
DbgPrint
ExInterlockedPopEntrySList
ExInterlockedPushEntrySList
ExInitializeNPagedLookasideList
RtlVolumeDeviceToDosName
RtlCopyUnicodeString
ObQueryNameString
ExQueueWorkItem
IoGetTopLevelIrp
IoGetAttachedDeviceReference
RtlEqualUnicodeString
MmGetSystemRoutineAddress
IoRegisterFsRegistrationChange
KeTickCount
KeQueryTimeIncrement
memmove
memcpy
strchr
_vsnwprintf
MmIsAddressValid
_vsnprintf
hal
KfReleaseSpinLock
ExAcquireFastMutex
ExReleaseFastMutex
KeGetCurrentIrql
KfAcquireSpinLock
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.v-lizer Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE