Static task
static1
Behavioral task
behavioral1
Sample
23b8f6697e1a7a0a72e485c259d55dc2a1f5cf8304743f93a294de787e1ef4f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23b8f6697e1a7a0a72e485c259d55dc2a1f5cf8304743f93a294de787e1ef4f3.exe
Resource
win10v2004-20221111-en
General
-
Target
23b8f6697e1a7a0a72e485c259d55dc2a1f5cf8304743f93a294de787e1ef4f3
-
Size
128KB
-
MD5
e4dc03e93dce5d2f22cfe6a54f3a35b6
-
SHA1
b24a7b3a305c63b1f19c993a339e59cffd536243
-
SHA256
23b8f6697e1a7a0a72e485c259d55dc2a1f5cf8304743f93a294de787e1ef4f3
-
SHA512
e708ff75b72c5796435b960feb2cac11a80f3caba2848eaa7915eb6c83040d52216f74211e4dc91f237cda48bb91516e98e8e8d51e5f5ca5e13569b3db031be0
-
SSDEEP
3072:fm0TCt/ZzZom0IYQnZcEmH8gSBfq+Mct/VuqBb:w/Xom0Z+Mct/VuqBb
Malware Config
Signatures
Files
-
23b8f6697e1a7a0a72e485c259d55dc2a1f5cf8304743f93a294de787e1ef4f3.exe windows x86
3b7a8ebfdc0251dfef3025c6e38aa7fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_allmul
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ZwClose
ZwSetValueKey
ZwCreateKey
ExFreePoolWithTag
ZwQueryValueKey
ExAllocatePool
ZwOpenKey
memset
ZwDeleteValueKey
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwSetInformationFile
ZwQueryInformationFile
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
ZwQuerySystemInformation
RtlUnicodeStringToInteger
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwEnumerateKey
isspace
atoi
strstr
ZwCreateSection
strncpy
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
ObfDereferenceObject
IoAttachDeviceToDeviceStack
KeDelayExecutionThread
IoGetDeviceObjectPointer
IoDetachDevice
IofCallDriver
RtlCompareMemory
_alldiv
ObReferenceObjectByHandle
KeSetEvent
KeWaitForSingleObject
KeInitializeEvent
ExAllocatePoolWithTag
IoFreeMdl
MmBuildMdlForNonPagedPool
IoAllocateMdl
MmMapLockedPagesSpecifyCache
_except_handler3
atol
KeResetEvent
KeWaitForMultipleObjects
PsTerminateSystemThread
PsCreateSystemThread
ObfReferenceObject
IoBuildDeviceIoControlRequest
IoGetRelatedDeviceObject
MmProbeAndLockPages
IoFreeIrp
IoAllocateIrp
IoCancelIrp
ZwQueryObject
ZwDuplicateObject
NtOpenProcess
RtlCompareUnicodeString
ZwWaitForSingleObject
ZwDeviceIoControlFile
ZwCreateEvent
ZwQueryDefaultLocale
PsGetVersion
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
ZwFsControlFile
KeSetPriorityThread
KeGetCurrentThread
DbgPrint
ExInterlockedPopEntrySList
ExInterlockedPushEntrySList
ExInitializeNPagedLookasideList
RtlVolumeDeviceToDosName
RtlCopyUnicodeString
ObQueryNameString
ExQueueWorkItem
IoGetTopLevelIrp
IoGetAttachedDeviceReference
RtlEqualUnicodeString
MmGetSystemRoutineAddress
IoRegisterFsRegistrationChange
KeTickCount
KeQueryTimeIncrement
memmove
memcpy
strchr
_vsnwprintf
MmIsAddressValid
_vsnprintf
hal
KfReleaseSpinLock
ExAcquireFastMutex
ExReleaseFastMutex
KeGetCurrentIrql
KfAcquireSpinLock
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.v-lizer Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE