Static task
static1
Behavioral task
behavioral1
Sample
a9a3ff42cef78058cc2828c60cfde68b999bc2adc43d132fd3a5127f0c872fcf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9a3ff42cef78058cc2828c60cfde68b999bc2adc43d132fd3a5127f0c872fcf.exe
Resource
win10v2004-20221111-en
General
-
Target
a9a3ff42cef78058cc2828c60cfde68b999bc2adc43d132fd3a5127f0c872fcf
-
Size
40KB
-
MD5
4f5f9bc90ef1d4c008ee7a896797a2c4
-
SHA1
a308cea20a288a0f924c4faf00c541f6eb5ca900
-
SHA256
a9a3ff42cef78058cc2828c60cfde68b999bc2adc43d132fd3a5127f0c872fcf
-
SHA512
ccd91ed4144fb5de9d93fe8bc036bd3f09bd4dceec12d1fc0f345694d1082f78df7188815ed7d9c50c52a0fe703777252ce5cd3a33469daa79b195b4ef4c1f45
-
SSDEEP
768:Ztebic/cVFlPh+46LX+yOt3ZwpokEK72djSw9HtUwv0ZgiyB1WEjZM+aptnw:ybvcVF5VcitWpo9u2duIHtUwYgiySEdX
Malware Config
Signatures
Files
-
a9a3ff42cef78058cc2828c60cfde68b999bc2adc43d132fd3a5127f0c872fcf.exe windows x86
c386ff3ed132b6de39dfd6e087601049
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwSetValueKey
MmGetSystemRoutineAddress
RtlInitUnicodeString
ObReferenceObjectByHandle
KeQuerySystemTime
ZwClose
swprintf
ZwOpenKey
ExFreePool
_snprintf
ExAllocatePoolWithTag
wcsncpy
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
ZwQueryValueKey
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
strncpy
PsLookupProcessByProcessId
_stricmp
KeDelayExecutionThread
ObfDereferenceObject
wcsrchr
wcsstr
_wcslwr
wcslen
_except_handler3
wcscat
wcscpy
_wcsicmp
IofCompleteRequest
ZwCreateKey
RtlCompareUnicodeString
ZwCreateFile
_wcsnicmp
_snwprintf
ZwDeleteKey
IoDeviceObjectType
RtlCopyUnicodeString
strncmp
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeQueryTimeIncrement
IoRegisterDriverReinitialization
wcschr
PsCreateSystemThread
ZwSetInformationFile
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 53B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ