Static task
static1
Behavioral task
behavioral1
Sample
ca9b169798e4799289e85fe44ac822b5d48c64822cd2dbabb517d3d7482f04fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca9b169798e4799289e85fe44ac822b5d48c64822cd2dbabb517d3d7482f04fb.exe
Resource
win10v2004-20220812-en
General
-
Target
ca9b169798e4799289e85fe44ac822b5d48c64822cd2dbabb517d3d7482f04fb
-
Size
40KB
-
MD5
08e5c205dd0af9fe36a1416986b560c0
-
SHA1
7a5c817c7280be9dcbc01c3a6e19b16a6c38f9e5
-
SHA256
ca9b169798e4799289e85fe44ac822b5d48c64822cd2dbabb517d3d7482f04fb
-
SHA512
414e3bd79febddda79e9454cdc7c7cb2541ce78afa4c8344842c283be18547aa9e4e050fe37d3ed9887565624c1380c5061fb55deaa18a426381acbf80b46274
-
SSDEEP
768:v52tJLZx8uVgjgvnyEg6xVEoxdlEDhRt6rPTSEKfXwVuG+Hw3AwG0Wz1NM6ckjXP:c3ZrVgsxjDesr7AxG+sa0YNTcS39+8mv
Malware Config
Signatures
Files
-
ca9b169798e4799289e85fe44ac822b5d48c64822cd2dbabb517d3d7482f04fb.exe windows x86
190fb3ab3d64b208f5044d616d5fcfdd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
IoGetCurrentProcess
MmIsAddressValid
IoDeviceObjectType
PsLookupProcessByProcessId
_stricmp
ZwClose
ZwOpenKey
RtlInitUnicodeString
ObfDereferenceObject
ZwCreateFile
swprintf
MmGetSystemRoutineAddress
_wcsicmp
ZwDeleteKey
_snwprintf
wcsncpy
wcslen
wcschr
strncmp
RtlAnsiStringToUnicodeString
wcsstr
_wcslwr
PsGetVersion
ZwQueryValueKey
_wcsnicmp
KeTickCount
KeQueryTimeIncrement
ExFreePool
_snprintf
ExAllocatePoolWithTag
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeDelayExecutionThread
KeQuerySystemTime
PsCreateSystemThread
ZwSetValueKey
_except_handler3
RtlCopyUnicodeString
ObReferenceObjectByHandle
wcscat
wcscpy
IoRegisterDriverReinitialization
RtlCompareUnicodeString
ZwCreateKey
wcsrchr
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
ZwSetInformationFile
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 67B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ