Static task
static1
Behavioral task
behavioral1
Sample
8fb10c7c062c002c49d15f8c21c05ff1fedcd51e6111ba67095ebd5e939ba74e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8fb10c7c062c002c49d15f8c21c05ff1fedcd51e6111ba67095ebd5e939ba74e.exe
Resource
win10v2004-20221111-en
General
-
Target
8fb10c7c062c002c49d15f8c21c05ff1fedcd51e6111ba67095ebd5e939ba74e
-
Size
40KB
-
MD5
413f499677ea8c8dcd1378075ce13b51
-
SHA1
3046e680bc4ec10c8ac9da3a4cf0d5e302b9350d
-
SHA256
8fb10c7c062c002c49d15f8c21c05ff1fedcd51e6111ba67095ebd5e939ba74e
-
SHA512
6903be5a2f17867e69db95328b8de742549131a713d98aec4721f9069b512f401dbc4b4321eab0d5b9f23b9ea65a355adbdf6a7590e68e07a8aa13bccc538ef2
-
SSDEEP
768:pcFG5NgKV6qd8uwIQhPXOEoycu4aLabGundwt4aYjlohAi579c1t2Gu0r:pB/gSDd8lISEcOdw9YpWAS79c1t2G
Malware Config
Signatures
Files
-
8fb10c7c062c002c49d15f8c21c05ff1fedcd51e6111ba67095ebd5e939ba74e.exe windows x86
216e6ab72152c5c7c6ecaf04e9f8cc05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
swprintf
ExFreePool
ExAllocatePoolWithTag
ZwClose
ObfDereferenceObject
strncpy
IoGetCurrentProcess
RtlInitUnicodeString
ZwSetValueKey
ZwCreateKey
wcslen
ZwQueryValueKey
ZwOpenKey
_except_handler3
ZwDeleteKey
RtlAnsiStringToUnicodeString
_snwprintf
strncmp
ZwSetInformationFile
ZwCreateFile
wcscpy
MmIsAddressValid
IoDeviceObjectType
_snprintf
PsSetCreateProcessNotifyRoutine
_wcsicmp
_stricmp
wcsstr
_wcslwr
ObReferenceObjectByHandle
RtlCopyUnicodeString
KeTickCount
KeQueryTimeIncrement
RtlCompareUnicodeString
wcsncpy
PsGetVersion
KeQuerySystemTime
_wcsnicmp
wcsrchr
wcscat
IofCompleteRequest
KeDelayExecutionThread
wcschr
PsLookupProcessByProcessId
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
IoRegisterDriverReinitialization
MmGetSystemRoutineAddress
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 57B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ