Static task
static1
Behavioral task
behavioral1
Sample
a08e6b740bf266ee503547f2b5dcf0cdb5355caca33399cab464fb554a60479f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a08e6b740bf266ee503547f2b5dcf0cdb5355caca33399cab464fb554a60479f.exe
Resource
win10v2004-20220901-en
General
-
Target
a08e6b740bf266ee503547f2b5dcf0cdb5355caca33399cab464fb554a60479f
-
Size
30KB
-
MD5
8192a3777c38cdc6501e15767939dd1f
-
SHA1
a419cafbf4c24f57c099d0bfe62f9f39bfd277b0
-
SHA256
a08e6b740bf266ee503547f2b5dcf0cdb5355caca33399cab464fb554a60479f
-
SHA512
5b2312b9cd8ae2c4c1c763e6a5ad8632ac4863c1d45203660a74c7bef8848fdb4a04044ab23837d817ef6f067cabf19016c120fdc805a92e04f1907b39ccf1c7
-
SSDEEP
768:dnTOSRQwPZKkj/fS5FxMOcmZgRXcy0xHDXAg4pu:dtRQ5krS5FxMOcmZcX4xj1L
Malware Config
Signatures
Files
-
a08e6b740bf266ee503547f2b5dcf0cdb5355caca33399cab464fb554a60479f.exe windows x86
e0941032f06040b72ecf6a7fd7230255
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
DbgLoadImageSymbols
DbgPrint
ZwQueryKey
strcmp
strcpy
IoOpenDeviceInterfaceRegistryKey
ZwLoadKey
tolower
sprintf
wcstombs
RtlImageNtHeader
RtlCompareUnicodeString
ExFreePool
ZwQueryInformationProcess
RtlCopyRangeList
RtlInitString
RtlFreeUnicodeString
PsLookupThreadByThreadId
KeQuerySystemTime
ZwDeviceIoControlFile
IoGetStackLimits
ExAllocatePool
RtlAnsiStringToUnicodeString
ZwLoadKey
IoInitializeRemoveLockEx
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 990B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 1024B - Virtual size: 663B
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ