Static task
static1
Behavioral task
behavioral1
Sample
90434f90c15193138e2d601d17b75708ef6c2a26b7712dfb906158afeaee4303.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90434f90c15193138e2d601d17b75708ef6c2a26b7712dfb906158afeaee4303.exe
Resource
win10v2004-20221111-en
General
-
Target
90434f90c15193138e2d601d17b75708ef6c2a26b7712dfb906158afeaee4303
-
Size
57KB
-
MD5
2109a822d9f42466456fb699c8dd9c58
-
SHA1
19f469059dbaf47e12ec62973bd1fc6fcc85615d
-
SHA256
90434f90c15193138e2d601d17b75708ef6c2a26b7712dfb906158afeaee4303
-
SHA512
8d0569c079489418982b7af7d953539ee9df3ed8ac8295cbcd2adf526bcbd1a02dd5d108c22eddc5f4e235113b0868185672685824776df545918c99b9d4e00a
-
SSDEEP
768:bSZr9ys4H3dF+WTkSvBWL2ehdSzNVU+ujDFExY0pD/UHvgp:bSZgsYXdYSvBC2ehdxTWO0pD/UHvg
Malware Config
Signatures
Files
-
90434f90c15193138e2d601d17b75708ef6c2a26b7712dfb906158afeaee4303.exe windows x86
45a64d3c532425d51caecd493263e942
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsSetCreateProcessNotifyRoutine
ExFreePool
wcsrchr
_wcslwr
MmIsAddressValid
wcsncpy
wcsstr
ExAllocatePoolWithTag
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
strncmp
IoGetCurrentProcess
strncpy
IoCreateFile
PsGetVersion
MmGetSystemRoutineAddress
_stricmp
PsLookupProcessByProcessId
ZwUnmapViewOfSection
swprintf
wcslen
IoDeleteDevice
KeInitializeSpinLock
KeInitializeEvent
IoCreateSymbolicLink
IoCreateDevice
MmUnmapIoSpace
MmMapIoSpace
MmGetPhysicalAddress
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
MmUnlockPages
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
IofCallDriver
IoGetRelatedDeviceObject
sprintf
ObReferenceObjectByName
IoDriverObjectType
KeServiceDescriptorTable
IoGetBaseFileSystemDeviceObject
InterlockedIncrement
InterlockedDecrement
_allmul
ZwOpenKey
ZwCreateKey
ZwOpenFile
RtlCopyUnicodeString
wcscat
wcscpy
IoFileObjectType
IoDeviceObjectType
ZwQuerySystemInformation
strstr
RtlAnsiStringToUnicodeString
RtlxAnsiStringToUnicodeSize
NlsMbCodePageTag
RtlInitAnsiString
MmSystemRangeStart
wcscmp
strncat
wcsncat
ZwSetInformationFile
RtlCompareUnicodeString
PsLookupThreadByThreadId
KeBugCheckEx
KeCancelTimer
KeSetEvent
KeInsertQueueApc
KeInitializeApc
ZwFreeVirtualMemory
ZwAllocateVirtualMemory
ZwOpenProcess
KeUnstackDetachProcess
IoFreeIrp
KeGetCurrentThread
IoAllocateIrp
wcstombs
IoCancelIrp
KeDetachProcess
KeAttachProcess
memmove
ZwOpenSymbolicLinkObject
KeClearEvent
KdDisableDebugger
KdDebuggerEnabled
KeBugCheck
ProbeForRead
_except_handler3
PsCreateSystemThread
PsThreadType
ObReferenceObjectByHandle
KeWaitForSingleObject
ObfDereferenceObject
ZwClose
atoi
KeDelayExecutionThread
PsTerminateSystemThread
RtlInitUnicodeString
IoCreateNotificationEvent
IofCompleteRequest
ZwSetValueKey
DbgPrint
hal
ExReleaseFastMutex
KeGetCurrentIrql
KfReleaseSpinLock
KfAcquireSpinLock
ExAcquireFastMutex
WRITE_PORT_UCHAR
KeRaiseIrqlToDpcLevel
KfLowerIrql
ndis.sys
NdisRegisterProtocol
NdisReadConfiguration
NdisDeregisterProtocol
NdisOpenProtocolConfiguration
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 768B - Virtual size: 750B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 896B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE