Static task
static1
Behavioral task
behavioral1
Sample
dd82d7e2ed0cd661a77d3e9636135c79beabd9de83ef380331fc16c579a2315e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd82d7e2ed0cd661a77d3e9636135c79beabd9de83ef380331fc16c579a2315e.exe
Resource
win10v2004-20221111-en
General
-
Target
dd82d7e2ed0cd661a77d3e9636135c79beabd9de83ef380331fc16c579a2315e
-
Size
3KB
-
MD5
99d0532000b9310e1d5b6acf205408a6
-
SHA1
29f187d365b3a98ddd38ca5509970f80697c2944
-
SHA256
dd82d7e2ed0cd661a77d3e9636135c79beabd9de83ef380331fc16c579a2315e
-
SHA512
c745b6af3be0ef5ef5b1f9b2171659eac3b2b24ffbacba6f3f6fd2f3dfe64ffbc14fd1048ac1d3749aec0bdf1b190c553b62f2283eb203b471faa0a9875ea077
Malware Config
Signatures
Files
-
dd82d7e2ed0cd661a77d3e9636135c79beabd9de83ef380331fc16c579a2315e.exe windows x86
b46f742a10a01a984623c5e4eb9691fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
MmGetSystemRoutineAddress
DbgPrint
PsTerminateSystemThread
ExAllocatePoolWithTag
ObfDereferenceObject
IoDeleteSymbolicLink
KeWaitForSingleObject
ObReferenceObjectByHandle
PsCreateSystemThread
PsLookupProcessByProcessId
IoCreateSymbolicLink
IoCreateDevice
RtlCopyUnicodeString
IoDeleteDevice
ExFreePoolWithTag
IofCompleteRequest
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 209B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 594B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ