Static task
static1
Behavioral task
behavioral1
Sample
8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361.exe
Resource
win10v2004-20230703-en
General
-
Target
8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361
-
Size
1.4MB
-
MD5
57f7d02deb886579dd968947673bb7d0
-
SHA1
e4cc4f6841bf2e31db5f7da2498097ee92a7a2db
-
SHA256
8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361
-
SHA512
75d86b6c3fb2f9cfc4286c69eafcebdeba7c38033bc744d87b8905ee00f6eeb2b772343f9df1c3d0b63a35ea06b44255d0e868fd5e613cc3f6e8b1edb78bc066
-
SSDEEP
24576:zeoxuL11nXixjworZ4FFuz9cF18Em3xDDDtpFyMXLD34z//xQ3lMt4+UX:Cl1nM9470Gyj3xDHXXH3y//xQVMC3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361
Files
-
8cf670098e29ea5b7666422bb0f7b3f688b2d85fbd49782fe2c8b60774efb361.exe windows x64
ce555e3a7dbc6890c3e764d4f1827b93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
PsGetProcessImageFileName
PsLookupProcessByProcessId
RtlInitUnicodeString
RtlCheckRegistryKey
RtlQueryRegistryValues
RtlUnicodeStringToAnsiString
tolower
KeDelayExecutionThread
ZwCreateFile
PsCreateSystemThread
ZwQueryValueKey
PsTerminateSystemThread
RtlRandomEx
KeQueryTimeIncrement
ZwClose
RtlAppendUnicodeStringToString
RtlFreeAnsiString
RtlCopyUnicodeString
ObfDereferenceObject
ZwOpenFile
ZwEnumerateKey
ZwQueryKey
ZwOpenKey
RtlGetVersion
ExAllocatePoolWithTag
ExFreePoolWithTag
IoRegisterShutdownNotification
RtlAnsiStringToUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
ZwSetValueKey
PsSetCreateProcessNotifyRoutine
IoUnregisterShutdownNotification
IofCompleteRequest
RtlWriteRegistryValue
IoCreateSymbolicLink
IoCreateDevice
_strnicmp
ZwCreateKey
_wcsnicmp
ZwReadFile
ZwDeleteValueKey
ZwQueryInformationFile
ZwQuerySystemInformation
KeUnstackDetachProcess
KeDetachProcess
ZwWaitForSingleObject
RtlImageNtHeader
KeStackAttachProcess
ZwAllocateVirtualMemory
KeBugCheckEx
ProbeForRead
IoDeleteSymbolicLink
towlower
__C_specific_handler
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 48.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
W0 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ