Static task
static1
Behavioral task
behavioral1
Sample
b71f802a0e7c93568ac11442179a8a147a99985ab21bd7b117f5900300c27e47.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b71f802a0e7c93568ac11442179a8a147a99985ab21bd7b117f5900300c27e47.exe
Resource
win10v2004-20220812-en
General
-
Target
b71f802a0e7c93568ac11442179a8a147a99985ab21bd7b117f5900300c27e47
-
Size
8KB
-
MD5
bc485557f2b601aa6e6a3448786ab90c
-
SHA1
e2dacec42226c36293303520206319415894f5c7
-
SHA256
b71f802a0e7c93568ac11442179a8a147a99985ab21bd7b117f5900300c27e47
-
SHA512
1ea4e4be030894b08820fafce2b345328f9fca1ffc304ac88661bc4682a9c7a554da3124ae63abf33df8f640e49e318fe15449cfea9d5529312210d049321abd
-
SSDEEP
192:zSLQYVHpdUQX0bLPYkImN7qZ3Co1t/mb/:mUF1e3F5Y/
Malware Config
Signatures
Files
-
b71f802a0e7c93568ac11442179a8a147a99985ab21bd7b117f5900300c27e47.exe windows x86
d91af52c8b056138d1cb849fed07901e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
memmove
ExFreePool
ExAllocatePoolWithTag
IofCompleteRequest
NtQueryDirectoryFile
NtQuerySystemInformation
IoGetCurrentProcess
ZwQueryObject
strncmp
RtlInitUnicodeString
wcscmp
wcscpy
IoCreateSymbolicLink
IoCreateDevice
KeInitializeSpinLock
NtDeviceIoControlFile
IoDeleteDevice
IoDeleteSymbolicLink
_wcsupr
hal
KfAcquireSpinLock
KfReleaseSpinLock
Sections
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 367B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 587B - Virtual size: 584B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE