Static task
static1
Behavioral task
behavioral1
Sample
7129dba0a53c6b639d8d1ae80a18ca52289bafa4dfe333ce846ecdd81402d565.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7129dba0a53c6b639d8d1ae80a18ca52289bafa4dfe333ce846ecdd81402d565.exe
Resource
win10v2004-20230220-en
General
-
Target
7129dba0a53c6b639d8d1ae80a18ca52289bafa4dfe333ce846ecdd81402d565
-
Size
4.3MB
-
MD5
43782d5f85a679a5cd05e1219a295c65
-
SHA1
0ef9bf7ab6dde1639f895a6a2400fec215dab1df
-
SHA256
7129dba0a53c6b639d8d1ae80a18ca52289bafa4dfe333ce846ecdd81402d565
-
SHA512
d7ba27677296be86d755ac96508dac0fd87535616eec5c759245d79b0bfaad42224781ed0a29934c03e611e88d146af1570762dea2842d457060ad55648f7874
-
SSDEEP
98304:k2tNxlDYHfTTvXt3xaUoi562wWF4PEiwARNH+EhVO2nutinD9MssC0:JJ6ui5t488qeVvncu9MrC
Malware Config
Signatures
Files
-
7129dba0a53c6b639d8d1ae80a18ca52289bafa4dfe333ce846ecdd81402d565.exe windows x64
05944b2749d835d529466691e3e455bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
IoGetCurrentProcess
ObReferenceObjectByHandle
ObfDereferenceObject
PsGetCurrentProcessId
NtBuildNumber
RtlTimeToTimeFields
ExSystemTimeToLocalTime
ZwCreateFile
ZwWriteFile
ZwClose
_snprintf
_vsnprintf
ZwQueryInformationFile
ZwReadFile
strcmp
strncmp
RtlCompareMemory
RtlImageNtHeader
RtlCompareUnicodeString
ExAllocatePoolWithTag
ExFreePoolWithTag
isupper
isdigit
tolower
strlen
_stricmp
strstr
wcscat
wcslen
_wcsicmp
RtlInitAnsiString
RtlQueryRegistryValues
RtlAnsiStringToUnicodeString
RtlCompareUnicodeStrings
ExAllocatePool
MmGetSystemRoutineAddress
PsCreateSystemThread
PsTerminateSystemThread
PsSetCreateProcessNotifyRoutineEx
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
ZwOpenProcess
PsGetProcessPeb
PsGetProcessSessionId
RtlRandomEx
KeBugCheckEx
RtlInitUnicodeString
_stricmp
NtQuerySystemInformation
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
ZwWaitForSingleObject
ZwDeviceIoControlFile
ZwOpenFile
_wcsnicmp
ZwEnumerateKey
ZwCreateEvent
MmGetSystemRoutineAddress
ZwCreateFile
__C_specific_handler
KeSetSystemAffinityThread
KeQueryActiveProcessors
KeQueryTimeIncrement
DbgBreakPointWithStatus
RtlTimeToTimeFields
ExSystemTimeToLocalTime
IoAllocateMdl
IoFreeMdl
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
KeWaitForSingleObject
KeReleaseMutex
KeInitializeMutex
ExFreePoolWithTag
ExAllocatePool
KeRevertToUserAffinityThread
DbgPrint
ExAllocatePool
NtQuerySystemInformation
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
KeQueryActiveProcessors
KeSetSystemAffinityThread
KeRevertToUserAffinityThread
DbgPrint
hal
KeQueryPerformanceCounter
KeQueryPerformanceCounter
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gg0 Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gg1 Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gg2 Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ