Static task
static1
Behavioral task
behavioral1
Sample
a2789ade0b5116383ceb74ceaaaba4410a7dc8fd6c8011397458d7b2a53c5c69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2789ade0b5116383ceb74ceaaaba4410a7dc8fd6c8011397458d7b2a53c5c69.exe
Resource
win10v2004-20220812-en
General
-
Target
a2789ade0b5116383ceb74ceaaaba4410a7dc8fd6c8011397458d7b2a53c5c69
-
Size
53KB
-
MD5
0f8677596d30c5d0cb826709fa1d09e0
-
SHA1
932480d1d33c82e4a667571599b03ab043d985b1
-
SHA256
a2789ade0b5116383ceb74ceaaaba4410a7dc8fd6c8011397458d7b2a53c5c69
-
SHA512
3262be75445c4a935f523fec1e5343fe25da46faa38abcd402dcdb365938ae0e0696733cab2e252bf2fc98db67d5d010be878af2ba72401d96c76f803914b5da
-
SSDEEP
768:K23eL7P5ODF3jvHRmmxwuFLEGjurB/SLIyKNoukC6fiDKYnIWmla:K23eP5y3rx3FLEJtSE3gC6fHzdl
Malware Config
Signatures
Files
-
a2789ade0b5116383ceb74ceaaaba4410a7dc8fd6c8011397458d7b2a53c5c69.exe windows x86
282edf89fde9193cc476b0c83d9ce6f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KefReleaseSpinLockFromDpcLevel
MmGetSystemRoutineAddress
RtlInitUnicodeString
DbgPrint
ZwOpenProcess
ObOpenObjectByPointer
PsProcessType
ZwClose
ZwWriteFile
ZwCreateFile
ZwDeleteFile
ExFreePoolWithTag
ZwReadFile
ExAllocatePool
ZwQueryInformationFile
RtlCompareString
RtlInitString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
KeServiceDescriptorTable
PsGetVersion
memset
KefAcquireSpinLockAtDpcLevel
RtlCopyUnicodeString
RtlCompareUnicodeString
PsLookupProcessByProcessId
ZwQuerySystemInformation
PsTerminateSystemThread
KeInsertQueueApc
KeInitializeApc
MmIsAddressValid
IoThreadToProcess
PsLookupThreadByThreadId
ZwSetValueKey
ZwCreateKey
ZwDeleteKey
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
IoFreeMdl
MmUnmapLockedPages
IoCheckShareAccess
RtlCompareMemory
IoDeleteDevice
PsCreateSystemThread
_allmul
RtlFreeUnicodeString
KeDelayExecutionThread
hal
KeRaiseIrqlToDpcLevel
KfLowerIrql
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ