Static task
static1
Behavioral task
behavioral1
Sample
3eb512134eeeafec42774cff3ad62cb8c11956d081dab7c40ef7b641ac7444be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3eb512134eeeafec42774cff3ad62cb8c11956d081dab7c40ef7b641ac7444be.exe
Resource
win10v2004-20220901-en
General
-
Target
3eb512134eeeafec42774cff3ad62cb8c11956d081dab7c40ef7b641ac7444be
-
Size
53KB
-
MD5
1c2482d455976c2cf26093650b403770
-
SHA1
c6d8908a81029db1a6935ba679bd066a5acb38cc
-
SHA256
3eb512134eeeafec42774cff3ad62cb8c11956d081dab7c40ef7b641ac7444be
-
SHA512
c17363468971f81cbc27555f2fcfcd97d23a98f5243aa0b525fbd7791eb3a039972d864b51649c9794a05f4cbe15bd4b59aa7f699798823daa23787a7ab3b9f3
-
SSDEEP
768:KV3eL7P5ODF3jvHRmmxwuFLEGjurB/SLIyKNoukC6fiDKYnIWmla:KV3eP5y3rx3FLEJtSE3gC6fHzdl
Malware Config
Signatures
Files
-
3eb512134eeeafec42774cff3ad62cb8c11956d081dab7c40ef7b641ac7444be.exe windows x86
282edf89fde9193cc476b0c83d9ce6f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KefReleaseSpinLockFromDpcLevel
MmGetSystemRoutineAddress
RtlInitUnicodeString
DbgPrint
ZwOpenProcess
ObOpenObjectByPointer
PsProcessType
ZwClose
ZwWriteFile
ZwCreateFile
ZwDeleteFile
ExFreePoolWithTag
ZwReadFile
ExAllocatePool
ZwQueryInformationFile
RtlCompareString
RtlInitString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
KeServiceDescriptorTable
PsGetVersion
memset
KefAcquireSpinLockAtDpcLevel
RtlCopyUnicodeString
RtlCompareUnicodeString
PsLookupProcessByProcessId
ZwQuerySystemInformation
PsTerminateSystemThread
KeInsertQueueApc
KeInitializeApc
MmIsAddressValid
IoThreadToProcess
PsLookupThreadByThreadId
ZwSetValueKey
ZwCreateKey
ZwDeleteKey
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
IoFreeMdl
MmUnmapLockedPages
IoCheckShareAccess
RtlCompareMemory
IoDeleteDevice
PsCreateSystemThread
_allmul
RtlFreeUnicodeString
KeDelayExecutionThread
hal
KeRaiseIrqlToDpcLevel
KfLowerIrql
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ