Static task
static1
Behavioral task
behavioral1
Sample
cb0c194b07d9abce4fc4732d35f883dd205d346765c7cadca9db02241b9d8275.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb0c194b07d9abce4fc4732d35f883dd205d346765c7cadca9db02241b9d8275.exe
Resource
win10v2004-20221111-en
General
-
Target
cb0c194b07d9abce4fc4732d35f883dd205d346765c7cadca9db02241b9d8275
-
Size
40KB
-
MD5
46213be4440d045a750ef50c2487011d
-
SHA1
006adb9ef43538d9326d42419f29ac0c74402590
-
SHA256
cb0c194b07d9abce4fc4732d35f883dd205d346765c7cadca9db02241b9d8275
-
SHA512
4794cf701a809a0fc9eb9abc45d9f5fd4945c43a3e93fd2fe33c5330c1303e40788759e8040e2ec883398c10e516c4a11504f373e105e4e318fc5a884a478dde
-
SSDEEP
768:B2O9KqMrO5oQcQjZNP0KgWkgCtk9VX8OvgZRBobPCrzKXWWZuJVHxG4fl:IWVMrOg+ZNP0wCtkTbBb89YUHx
Malware Config
Signatures
Files
-
cb0c194b07d9abce4fc4732d35f883dd205d346765c7cadca9db02241b9d8275.exe windows x86
c672953727dbe8023b69b27a78d3c554
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
PsSetCreateProcessNotifyRoutine
ZwClose
ZwSetValueKey
wcslen
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
_except_handler3
ExFreePool
_snprintf
ExAllocatePoolWithTag
strncpy
IoGetCurrentProcess
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
wcsncpy
wcsrchr
RtlCompareUnicodeString
ZwSetInformationFile
ZwCreateFile
wcscpy
swprintf
KeTickCount
KeQueryTimeIncrement
_stricmp
IoRegisterDriverReinitialization
wcscat
_wcsicmp
RtlAnsiStringToUnicodeString
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snwprintf
PsGetVersion
MmGetSystemRoutineAddress
ZwDeleteKey
wcsstr
_wcslwr
PsCreateSystemThread
IofCompleteRequest
RtlCopyUnicodeString
ZwCreateKey
PsLookupProcessByProcessId
_wcsnicmp
KeDelayExecutionThread
KeQuerySystemTime
IoDeviceObjectType
wcschr
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 63B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ