Static task
static1
Behavioral task
behavioral1
Sample
7898ead1d6b99c91333eecf2123973c47f4f8bae4348bb71c93d70aea54045e6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7898ead1d6b99c91333eecf2123973c47f4f8bae4348bb71c93d70aea54045e6.exe
Resource
win10v2004-20220812-en
General
-
Target
7898ead1d6b99c91333eecf2123973c47f4f8bae4348bb71c93d70aea54045e6
-
Size
40KB
-
MD5
10838c17028a2bfe375270909dbe2839
-
SHA1
3be4b3a65b2e542d766590ce3b4b4a06a26110ae
-
SHA256
7898ead1d6b99c91333eecf2123973c47f4f8bae4348bb71c93d70aea54045e6
-
SHA512
7af8099b344fad9149d0a155778d5ffec20a545b464f57f3eab60de93af524a7179c9c46266ab8a85a63b7ba3e9add365b251b6fa77ab901392de3ab2b6b7b1d
-
SSDEEP
768:yXlkJX8N57VgRZWKynSqAY239cD95CDUHbjf6e4Ko5qOpZ+X1R3Fl1VvTy4:y1IX8NbgRHqx2qDUUHbjfeNpZ+X1RFl7
Malware Config
Signatures
Files
-
7898ead1d6b99c91333eecf2123973c47f4f8bae4348bb71c93d70aea54045e6.exe windows x86
e52f3d498677711cc5710701340f08ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcslen
ZwCreateKey
RtlInitUnicodeString
swprintf
wcsncpy
wcsrchr
ZwClose
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
ZwOpenKey
strncpy
PsLookupProcessByProcessId
_stricmp
_snwprintf
ExAllocatePoolWithTag
ZwSetValueKey
ZwQueryValueKey
_except_handler3
ExFreePool
KeDelayExecutionThread
KeQuerySystemTime
_wcsicmp
wcscat
wcscpy
_wcsnicmp
IofCompleteRequest
ZwSetInformationFile
ZwCreateFile
PsSetCreateProcessNotifyRoutine
IoGetCurrentProcess
KeTickCount
KeQueryTimeIncrement
IoDeviceObjectType
strncmp
PsGetVersion
ZwDeleteKey
PsCreateSystemThread
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
_snprintf
MmGetSystemRoutineAddress
IoRegisterDriverReinitialization
wcsstr
_wcslwr
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlCopyUnicodeString
wcschr
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ