Static task
static1
Behavioral task
behavioral1
Sample
b4e153010fff43242fd8823e6f447479c5655bac8933af606006e5aad86d90ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4e153010fff43242fd8823e6f447479c5655bac8933af606006e5aad86d90ac.exe
Resource
win10v2004-20221111-en
General
-
Target
b4e153010fff43242fd8823e6f447479c5655bac8933af606006e5aad86d90ac
-
Size
18KB
-
MD5
33be6ab48a8729430eb9d1d17eb991ad
-
SHA1
e685557e33ded7572f05fb08efe3fba0e72d2f9d
-
SHA256
b4e153010fff43242fd8823e6f447479c5655bac8933af606006e5aad86d90ac
-
SHA512
8241137e6d81ad6f3ca5eaac7dbad5df17e9e403b3de85c6ab256862a0999f38a3e2728dc8775ae34cf0609724e2a699fa525c1003ee8526c00cb15f6f5f3dd2
-
SSDEEP
384:3J9v3EyuvymGtyShEwkwUqXLKnyYMepQH0PBGZui2eMwHbZ7wvVF4N09z3b71+7c:3TCGy+UV76U
Malware Config
Signatures
Files
-
b4e153010fff43242fd8823e6f447479c5655bac8933af606006e5aad86d90ac.exe windows x86
e890af971ff32086787261dce5e980ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ProbeForRead
_except_handler3
_stricmp
IofCompleteRequest
PsGetCurrentProcessId
_strupr
IoGetCurrentProcess
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
ProbeForWrite
ExAllocatePoolWithTag
ZwPulseEvent
MmGetSystemRoutineAddress
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
ZwQuerySystemInformation
ZwQueryInformationProcess
strncmp
IoDeleteDevice
IoDeleteSymbolicLink
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
MmSizeOfMdl
PsTerminateSystemThread
MmIsAddressValid
ExFreePool
ExGetPreviousMode
hal
KfReleaseSpinLock
KfAcquireSpinLock
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zcata Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
vcata Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 992B - Virtual size: 992B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 378B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ