Static task
static1
Behavioral task
behavioral1
Sample
c2789a48c5a8468979a034b39d713b825b88bd21256ba39bf3c5eec64a068135.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2789a48c5a8468979a034b39d713b825b88bd21256ba39bf3c5eec64a068135.exe
Resource
win10v2004-20221111-en
General
-
Target
c2789a48c5a8468979a034b39d713b825b88bd21256ba39bf3c5eec64a068135
-
Size
40KB
-
MD5
8d61364b1deb6ad7bcc2b48a8afa6d55
-
SHA1
46daeff52633d485a0f7b099adf158a646dd4bbf
-
SHA256
c2789a48c5a8468979a034b39d713b825b88bd21256ba39bf3c5eec64a068135
-
SHA512
86b2674179c52953dba0fddc6d5b0aaacf9c1095ecd30a5f88818941d23e64300f47c667379bed6fd5d4ec5465aa0dc3e1fa82015abd391dbb05dba53e656f6a
-
SSDEEP
768:Lonj94V47N+e/qUeFVVhz7pWGmlGgnN1pCs9Tp3VcIoCgOLfYSHgVLf:eamQeijPJ7liN1pN77YiE
Malware Config
Signatures
Files
-
c2789a48c5a8468979a034b39d713b825b88bd21256ba39bf3c5eec64a068135.exe windows x86
e2f8c576c2a7fbe19900dd1313e4ef7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
IoDeviceObjectType
strncpy
PsLookupProcessByProcessId
_stricmp
ZwSetValueKey
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
_except_handler3
RtlCopyUnicodeString
_wcsicmp
wcslen
swprintf
wcscat
wcscpy
IoGetCurrentProcess
ObReferenceObjectByHandle
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeDelayExecutionThread
KeQuerySystemTime
wcsstr
_wcslwr
PsGetVersion
_wcsnicmp
ObfDereferenceObject
wcsncpy
wcsrchr
PsSetCreateProcessNotifyRoutine
ExFreePool
_snprintf
ExAllocatePoolWithTag
strncmp
IofCompleteRequest
ZwDeleteKey
PsCreateSystemThread
_snwprintf
RtlCompareUnicodeString
KeTickCount
KeQueryTimeIncrement
wcschr
ZwCreateKey
ZwSetInformationFile
ZwCreateFile
MmGetSystemRoutineAddress
IoRegisterDriverReinitialization
RtlAnsiStringToUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 57B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ