Static task
static1
Behavioral task
behavioral1
Sample
67fa207d4f43ae7997a2af59c3d109acc15730d4f567c8d7a370c55a5fea7bad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67fa207d4f43ae7997a2af59c3d109acc15730d4f567c8d7a370c55a5fea7bad.exe
Resource
win10v2004-20220812-en
General
-
Target
67fa207d4f43ae7997a2af59c3d109acc15730d4f567c8d7a370c55a5fea7bad
-
Size
70KB
-
MD5
2fa1eb35619b2d8f6d8e8afb194bcd9e
-
SHA1
9d90a6af12b5edd38394da7cbffff84a2a324ee5
-
SHA256
67fa207d4f43ae7997a2af59c3d109acc15730d4f567c8d7a370c55a5fea7bad
-
SHA512
109682715df8ba1a0fb5130239b2fe6ba11075e4f08ab881451b8a58085f8d721a40c7f439acf81b7d9e002b65404b94abb865b72f58e7c8e45158ef34aaff0b
-
SSDEEP
1536:a3eIPR0EftJoeuskjQspTKAQRLSNj8bLMWECXjQANtQ/:adOEf5VkssxKAQR2Nj8bLtTltQ/
Malware Config
Signatures
Files
-
67fa207d4f43ae7997a2af59c3d109acc15730d4f567c8d7a370c55a5fea7bad.exe windows x86
e4d5018239adc4a7d57290e9c40cebd2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExFreePoolWithTag
wcschr
_stricmp
strncpy
wcsncpy
strlen
RtlCompareMemory
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlInitUnicodeString
memset
KeInitializeMutex
KeWaitForSingleObject
KeReleaseMutex
ZwClose
ObReferenceObjectByHandle
PsCreateSystemThread
KeQuerySystemTime
_aulldiv
RtlUnicodeStringToInteger
RtlTimeToTimeFields
_allmul
KeUnstackDetachProcess
KeStackAttachProcess
IofCompleteRequest
PoCallDriver
PoStartNextPowerIrp
IoDeleteDevice
IoAttachDeviceToDeviceStack
IoCreateDevice
ObfReferenceObject
IoGetRelatedDeviceObject
IoCreateFile
IoAttachDevice
IofCallDriver
IoGetCurrentProcess
_purecall
RtlWriteRegistryValue
RtlCreateRegistryKey
swprintf
ExAllocatePoolWithTag
RtlFreeUnicodeString
MmGetSystemRoutineAddress
strcmp
MmUnlockPages
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
RtlCopyUnicodeString
DbgPrint
KeNumberProcessors
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlQueryRegistryValues
PsGetVersion
IoRegisterShutdownNotification
KeSetEvent
KeInitializeEvent
KeGetCurrentThread
ObfDereferenceObject
RtlCompareUnicodeString
ObQueryNameString
ObReferenceObjectByName
IoDriverObjectType
IoFreeIrp
ObInsertObject
IoAllocateIrp
SeSetAccessStateGenericMapping
RtlMapGenericMask
SeCreateAccessState
ObCreateObject
IoFileObjectType
IoBuildDeviceIoControlRequest
IoCancelIrp
KeWaitForMultipleObjects
KeResetEvent
KeClearEvent
IoCreateSynchronizationEvent
KeSetPriorityThread
KeBugCheckEx
MmIsAddressValid
strchr
ZwWriteFile
ZwReadFile
RtlDeleteRegistryValue
memcpy
RtlUnwind
hal
KfRaiseIrql
KfAcquireSpinLock
KfReleaseSpinLock
KeGetCurrentIrql
KfLowerIrql
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pagecode Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ