Static task
static1
Behavioral task
behavioral1
Sample
b3908aa86cf861d00a114440010872b3be59196fd652d6438bf3ec2eb82bd852.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3908aa86cf861d00a114440010872b3be59196fd652d6438bf3ec2eb82bd852.exe
Resource
win10v2004-20221111-en
General
-
Target
b3908aa86cf861d00a114440010872b3be59196fd652d6438bf3ec2eb82bd852
-
Size
4KB
-
MD5
514d30c071c3708488e0a13c021e9829
-
SHA1
03afab126029de68ddd67f0943087711eed1ff10
-
SHA256
b3908aa86cf861d00a114440010872b3be59196fd652d6438bf3ec2eb82bd852
-
SHA512
1e38c09b2028e6fc58bb7731aec36c9acbce7d7704cbdb6ebf2f9dacc3b696221b5e56506c97bd369c09e0bc75906e7e603dad36296797e3c4ac4deb271dab7c
Malware Config
Signatures
Files
-
b3908aa86cf861d00a114440010872b3be59196fd652d6438bf3ec2eb82bd852.exe windows x86
5473279f16e7fc66d044e9c40d2dd86b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
KeDelayExecutionThread
DbgPrint
MmGetSystemRoutineAddress
ZwClose
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 128B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 147B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 106B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ