Static task
static1
Behavioral task
behavioral1
Sample
e9b147de3485743b26a5ed0bc2494107e25a38722e5b3b762c1c680d414602df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e9b147de3485743b26a5ed0bc2494107e25a38722e5b3b762c1c680d414602df.exe
Resource
win10v2004-20220812-en
General
-
Target
e9b147de3485743b26a5ed0bc2494107e25a38722e5b3b762c1c680d414602df
-
Size
46KB
-
MD5
a86064179c4d0b4313819ffbfaefacc7
-
SHA1
14d7b95a205a2a5e77e3349c94b24a3eb5d71287
-
SHA256
e9b147de3485743b26a5ed0bc2494107e25a38722e5b3b762c1c680d414602df
-
SHA512
102e245b85c82ffde2f5a05a0fbdc589413689f9529f0509d108b900064c42ca80f4824af5ba483c7c07bab18d5c441066acdcdae9450ee77345dbe96bc41d5f
-
SSDEEP
768:yH9YebaqJlRTmL0B2UbAAvTSz3CTegIdWO6FHRCUaHHDRSOUC:yu8aw8orAA7A3Hd70HFCHDRSU
Malware Config
Signatures
Files
-
e9b147de3485743b26a5ed0bc2494107e25a38722e5b3b762c1c680d414602df.exe windows x86
19aaed414ac53f53e82ce8e60241ef10
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeGetCurrentThread
memset
RtlHashUnicodeString
IoQueryDeviceDescription
RtlInitUnicodeString
ExAllocatePoolWithTag
RtlGetVersion
RtlCharToInteger
KeTickCount
KeBugCheckEx
ZwDeleteKey
ExFreePoolWithTag
hal
KeGetCurrentIrql
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 474B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ