Static task
static1
Behavioral task
behavioral1
Sample
78ee17d354edb1bb5200a0c40a0d08cd7e1977218f020058f437dac62474f6a8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78ee17d354edb1bb5200a0c40a0d08cd7e1977218f020058f437dac62474f6a8.exe
Resource
win10v2004-20220901-en
General
-
Target
78ee17d354edb1bb5200a0c40a0d08cd7e1977218f020058f437dac62474f6a8
-
Size
40KB
-
MD5
5b928bea82c5f6eb53c1f16c75c17964
-
SHA1
4c7501d171a8a7837b036c7cdd694da8c747fb80
-
SHA256
78ee17d354edb1bb5200a0c40a0d08cd7e1977218f020058f437dac62474f6a8
-
SHA512
616c78829f1b92738c8b2fd3772522e54c2d8b6f8b21c8b93ada9739e0341d9879242f90b6c03411d27379639645955972c0b22e1d35fda8e4f131c476b95579
-
SSDEEP
768:XUs8fLmz/v+o6dTjLtXJR4/qrHafvTSVhwCKzMahYgtN7qKJ:iqL+o6DXH4/qrafvTSTwCVngtN
Malware Config
Signatures
Files
-
78ee17d354edb1bb5200a0c40a0d08cd7e1977218f020058f437dac62474f6a8.exe windows x86
90f110c95f4bffa1e8bf2e670e9f9295
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwSetValueKey
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
_except_handler3
strncmp
IoGetCurrentProcess
RtlCopyUnicodeString
ZwCreateKey
swprintf
PsSetCreateProcessNotifyRoutine
MmGetSystemRoutineAddress
wcslen
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
wcsncpy
wcsrchr
strncpy
RtlCompareUnicodeString
_wcsnicmp
wcsstr
_wcslwr
_wcsicmp
ExFreePool
ExAllocatePoolWithTag
ZwDeleteKey
_snwprintf
RtlAnsiStringToUnicodeString
PsGetVersion
PsCreateSystemThread
_snprintf
IoRegisterDriverReinitialization
_stricmp
IoDeviceObjectType
PsLookupProcessByProcessId
wcschr
wcscat
wcscpy
KeDelayExecutionThread
KeQuerySystemTime
ZwCreateFile
ZwSetInformationFile
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IofCompleteRequest
KeTickCount
KeQueryTimeIncrement
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 54B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ