Static task
static1
Behavioral task
behavioral1
Sample
f86e84c3b908daf6863ddc096469960550a45ee35465b35ccc95dc3bf7c9134a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f86e84c3b908daf6863ddc096469960550a45ee35465b35ccc95dc3bf7c9134a.exe
Resource
win10v2004-20220812-en
General
-
Target
f86e84c3b908daf6863ddc096469960550a45ee35465b35ccc95dc3bf7c9134a
-
Size
47KB
-
MD5
4bb069de345795b8463d6cdc61e5d61a
-
SHA1
b35d4779c7cba5c1c6e44288608d0ec55e431c36
-
SHA256
f86e84c3b908daf6863ddc096469960550a45ee35465b35ccc95dc3bf7c9134a
-
SHA512
a3435da7ac984a1917802d1ea7f33c14d135078f7251b343631ecc7efa03b02c8d08e5a2e264d9421f0f573cc95a0704843716f73d292f28d9bc7c0d1fe3bd12
-
SSDEEP
384:QdRvBP28zqQFv2Gs/uWzFs3EIIIgvRgIBEUpdtdn8pMtL0QYWHH:8XPLzRFOG8uWzC3iIUTXj1
Malware Config
Signatures
Files
-
f86e84c3b908daf6863ddc096469960550a45ee35465b35ccc95dc3bf7c9134a.exe windows x86
c43f7a7de46ddc5b0e2b27c1f7519ff4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
NtQueryInformationAtom
_allrem
RtlCreateAcl
IoInitializeIrp
IoRaiseInformationalHardError
PfxRemovePrefix
InterlockedIncrement
READ_REGISTER_UCHAR
RtlExtendedLargeIntegerDivide
FsRtlDoesNameContainWildCards
RtlSetDaclSecurityDescriptor
strrchr
InbvAcquireDisplayOwnership
ExInterlockedExchangeUlong
RtlRealPredecessor
PoShutdownBugCheck
KeAcquireSpinLockAtDpcLevel
RtlFindUnicodePrefix
KeSetTimerEx
RtlEqualUnicodeString
isprint
_strrev
MmLockPagableDataSection
PsRestoreImpersonation
SeAccessCheck
FsRtlNotifyFullChangeDirectory
PsAssignImpersonationToken
WRITE_REGISTER_BUFFER_UCHAR
ExCreateCallback
RtlUpcaseUnicodeStringToCountedOemString
MmIsDriverVerifying
ObDereferenceObject
IoStartTimer
ObReferenceObjectByName
Ke386CallBios
MmCanFileBeTruncated
ZwLoadKey
wcschr
KeDeregisterBugCheckCallback
LdrEnumResources
sprintf
FsRtlSyncVolumes
IoGetBaseFileSystemDeviceObject
FsRtlIsDbcsInExpression
RtlEnlargedIntegerMultiply
RtlAppendUnicodeStringToString
KeUnstackDetachProcess
_allshr
FsRtlIsNtstatusExpected
MmIsNonPagedSystemAddressValid
RtlNumberOfSetBits
RtlUnicodeStringToAnsiString
SeImpersonateClient
_local_unwind2
KeGetPreviousMode
towupper
RtlGetCallersAddress
CcRepinBcb
_abnormal_termination
ZwLoadKey
CcSetDirtyPageThreshold
NlsAnsiCodePage
MmSetAddressRangeModified
SeDeassignSecurity
MmForceSectionClosed
wcschr
IoFreeIrp
FsRtlIsDbcsInExpression
ExLocalTimeToSystemTime
ExFreePoolWithTag
ObMakeTemporaryObject
RtlLargeIntegerShiftLeft
ZwUnmapViewOfSection
IoAcquireRemoveLockEx
KeSetSystemAffinityThread
IoWMIWriteEvent
RtlIsRangeAvailable
RtlGetSaclSecurityDescriptor
ExAcquireResourceSharedLite
CcSetAdditionalCacheAttributes
IoGetStackLimits
KeResetEvent
RtlLargeIntegerSubtract
IoFileObjectType
FsRtlFastCheckLockForWrite
MmResetDriverPaging
ExReinitializeResourceLite
IoGetRelatedDeviceObject
ZwFlushKey
RtlGetGroupSecurityDescriptor
IoCreateNotificationEvent
NlsLeadByteInfo
RtlStringFromGUID
ExSystemExceptionFilter
ExReleaseResourceLite
WRITE_REGISTER_ULONG
KeI386AllocateGdtSelectors
NlsLeadByteInfo
ZwSetTimer
InbvResetDisplay
CcUnpinRepinnedBcb
IoUnregisterFileSystem
KiReleaseSpinLock
IoSetIoCompletion
KeNumberProcessors
PfxRemovePrefix
IoGetAttachedDevice
MmUnmapLockedPages
PsSetLegoNotifyRoutine
ZwAccessCheckAndAuditAlarm
strchr
ZwCreateEvent
RtlUpcaseUnicodeStringToAnsiString
IoGetFileObjectGenericMapping
RtlLargeIntegerShiftRight
wcsncat
FsRtlOplockFsctrl
IoUnregisterShutdownNotification
_wcslwr
CcUnpinRepinnedBcb
ZwQueryDirectoryObject
NtWriteFile
KeRemoveEntryDeviceQueue
ZwQueryValueKey
FsRtlNormalizeNtstatus
RtlValidRelativeSecurityDescriptor
ExInitializeZone
ZwRequestWaitReplyPort
RtlImageDirectoryEntryToData
MmFlushImageSection
_wcsnicmp
IoConnectInterrupt
ZwSetSecurityObject
KeAcquireSpinLockAtDpcLevel
RtlUnicodeStringToInteger
Exfi386InterlockedExchangeUlong
IoIsOperationSynchronous
IoDisconnectInterrupt
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 128B - Virtual size: 128B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ