Static task
static1
Behavioral task
behavioral1
Sample
aa6d434ff6a079fa8eccc0e748d422620b2b48a5839f66239e645884b1bd7723.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa6d434ff6a079fa8eccc0e748d422620b2b48a5839f66239e645884b1bd7723.exe
Resource
win10v2004-20220901-en
General
-
Target
aa6d434ff6a079fa8eccc0e748d422620b2b48a5839f66239e645884b1bd7723
-
Size
16KB
-
MD5
5f5404830b4f84f55de7592b5698e4d9
-
SHA1
a30dcf6623500f0241b43640257fe5f28a3a63b3
-
SHA256
aa6d434ff6a079fa8eccc0e748d422620b2b48a5839f66239e645884b1bd7723
-
SHA512
08929d830975725bcfb5a9c83903a00e5950f00f4302c28512570f89d574a190abb0f13fd4ce7fd968f249d5d5231fd8c3145650426ed83d181c4b30a7bfa259
-
SSDEEP
384:2NSkZGM38F+j66wuhiTWV3hWtblFJtJh:2Ukf38vuhIWclFJv
Malware Config
Signatures
Files
-
aa6d434ff6a079fa8eccc0e748d422620b2b48a5839f66239e645884b1bd7723.exe windows x86
35469bda6fd183f90eb4bbef9b3b657e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memset
ObReferenceObjectByName
memcpy
IoDeleteSymbolicLink
_wcsnicmp
RtlInitUnicodeString
IoDeleteDevice
swprintf
RtlGetVersion
ZwClose
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
MmMapLockedPagesSpecifyCache
IoCreateDevice
PsGetCurrentThreadId
strlen
wcslen
wcsrchr
ObReferenceObjectByHandle
ObfDereferenceObject
RtlMultiByteToUnicodeN
wcscpy
ZwOpenKey
IoGetCurrentProcess
ObReferenceObjectByPointer
PsGetThreadProcessId
ExFreePoolWithTag
MmIsAddressValid
ExAllocatePoolWithTag
_except_handler3
hal
KfRaiseIrql
KfLowerIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 576B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 864B - Virtual size: 850B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 752B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ