Static task
static1
Behavioral task
behavioral1
Sample
8f8e129c492171cdd3f34a802987bb42680b932edba4f560054fbe41c883e47f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f8e129c492171cdd3f34a802987bb42680b932edba4f560054fbe41c883e47f.exe
Resource
win10v2004-20220812-en
General
-
Target
8f8e129c492171cdd3f34a802987bb42680b932edba4f560054fbe41c883e47f
-
Size
5KB
-
MD5
7dd143443c609905bc2fbcb25a9d5607
-
SHA1
833d2aa67a56b03b09711c1d723bb78691739516
-
SHA256
8f8e129c492171cdd3f34a802987bb42680b932edba4f560054fbe41c883e47f
-
SHA512
1ef0922ef1dc6d32a567768fbd7178f6dc05b215de7ea8fbaf18b2aea534572732b926aa328b2173c4f63cdf95b5ca63c2fa262e19e6b50aa9b53d7e65122bc1
-
SSDEEP
96:gidg+qaGYPSFFt0sTRaFIFcRU2xq3cE538TnyH:gbYPSFFt0sQFU5B9d
Malware Config
Signatures
Files
-
8f8e129c492171cdd3f34a802987bb42680b932edba4f560054fbe41c883e47f.exe windows x86
b3dc880222aab42e2f3fa2a52aa04032
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
IoGetCurrentProcess
ExAllocatePoolWithTag
_stricmp
wcslen
ExFreePool
_wcsicmp
_except_handler3
RtlCompareUnicodeString
RtlInitUnicodeString
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ProbeForRead
IofCompleteRequest
strncmp
ZwQueryDirectoryFile
ZwQuerySystemInformation
InterlockedExchange
ZwEnumerateValueKey
KeServiceDescriptorTable
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 758B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ