Static task
static1
Behavioral task
behavioral1
Sample
9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1.exe
Resource
win10v2004-20230703-en
General
-
Target
9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1
-
Size
307KB
-
MD5
515547a2189ff8d848568452892a277c
-
SHA1
3feaaa786634b08a7ddc4fb52c03d07dbb26bcbc
-
SHA256
9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1
-
SHA512
15735c38b54922dfcf3e4e68d7198f61da96f3bf7d3cdb7591dd39f1c7e9018927b2f163bf940c7cdaa8e011e4ed777baeb9797d2af87e916c5d4b9168a71d4c
-
SSDEEP
6144:P3TSFuCBYRZMcGP4glqa1IbwMUe4r9KbtW/:PWuCeMrKa1he7tW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1
Files
-
9bcc6ffc6f008a4ff32493717924f8ce7d6658830966f87db4ea671b3f5092c1.exe windows x64
63d3022c82c1d90ac08885dd8a7dc922
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
PsRemoveLoadImageNotifyRoutine
ExpInterlockedPushEntrySList
ExpInterlockedPopEntrySList
ExDeletePagedLookasideList
ExQueryDepthSList
ExInitializePagedLookasideList
KeSetEvent
KeWaitForSingleObject
IoDeleteSymbolicLink
IoDeleteDevice
InitSafeBootMode
IoCreateSymbolicLink
IoCreateDevice
IoAcquireRemoveLockEx
IoReleaseRemoveLockEx
MmUnmapLockedPages
RtlAnsiStringToUnicodeString
ZwReadFile
KeInitializeApc
KeInsertQueueApc
IoCreateFile
RtlInitAnsiString
RtlUnicodeStringToAnsiString
IoIs32bitProcess
MmProtectMdlSystemAddress
RtlEqualUnicodeString
IoFreeMdl
RtlImageDirectoryEntryToData
ZwSetInformationFile
RtlFreeUnicodeString
ZwCreateFile
PsCreateSystemThread
MmMapLockedPagesSpecifyCache
PsTerminateSystemThread
ZwFreeVirtualMemory
RtlRandomEx
RtlFreeAnsiString
MmProbeAndLockPages
PsThreadType
RtlCompareMemory
MmUnlockPages
ZwOpenFile
RtlImageNtHeader
ZwQueryInformationFile
ZwWriteFile
IoAllocateMdl
ZwAllocateVirtualMemory
RtlGetVersion
ZwDeleteValueKey
ZwSetValueKey
ZwQueryValueKey
RtlCompareUnicodeString
ExAcquireResourceExclusiveLite
KeLeaveCriticalRegion
ExGetPreviousMode
PsSetCreateProcessNotifyRoutine
ObQueryNameString
ExAcquireResourceSharedLite
ExReleaseResourceLite
RtlPrefixUnicodeString
IofCompleteRequest
ZwDeviceIoControlFile
ObfReferenceObject
CmRegisterCallbackEx
_vsnwprintf
CmUnRegisterCallback
KeDelayExecutionThread
KeQueryTimeIncrement
ProbeForWrite
PsGetProcessInheritedFromUniqueProcessId
ZwOpenProcess
PsGetProcessWow64Process
MmSystemRangeStart
RtlSetDaclSecurityDescriptor
ExUnregisterCallback
IoRegisterShutdownNotification
ExRegisterCallback
ExCreateCallback
PsGetProcessCreateTimeQuadPart
RtlCopyUnicodeString
KeResetEvent
KeReleaseSpinLock
KeReleaseMutex
KeAcquireSpinLockRaiseToDpc
IoFreeWorkItem
IoAllocateWorkItem
IoReleaseRemoveLockAndWaitEx
IoInitializeRemoveLockEx
IoQueueWorkItem
RtlInitString
MmBuildMdlForNonPagedPool
RtlEqualString
KeBugCheckEx
PsSetLoadImageNotifyRoutine
PsGetCurrentProcessId
ZwOpenKey
PsGetCurrentThreadId
ObReferenceObjectByHandle
IoGetCurrentProcess
IoGetDeviceObjectPointer
MmUserProbeAddress
IoVolumeDeviceToDosName
KeUnstackDetachProcess
ZwQuerySystemInformation
RtlQueryRegistryValues
MmGetSystemRoutineAddress
RtlInitUnicodeString
_wcsnicmp
PsLookupProcessByProcessId
ExFreePoolWithTag
ExRaiseStatus
ProbeForRead
ObOpenObjectByName
ZwCreateKey
KeInitializeEvent
RtlAppendUnicodeToString
ExAcquireFastMutex
ExReleaseFastMutex
ExInitializeResourceLite
ExDeleteResourceLite
RtlHashUnicodeString
KeStackAttachProcess
ObOpenObjectByPointer
ObfDereferenceObject
MmIsAddressValid
ZwQueryInformationProcess
RtlAppendUnicodeStringToString
KeEnterCriticalRegion
ZwClose
wcslen
ZwEnumerateValueKey
ZwEnumerateKey
strlen
ZwMapViewOfSection
ZwUnmapViewOfSection
strcmp
ZwCreateSection
FsRtlIsNameInExpression
towupper
PsProcessType
IoGetTopLevelIrp
PsLookupThreadByThreadId
KeAreApcsDisabled
RtlDeleteElementGenericTable
RtlLookupElementGenericTable
RtlEnumerateGenericTable
RtlIsGenericTableEmpty
RtlInitializeGenericTable
RtlInsertElementGenericTable
PsIsThreadTerminating
RtlCompressBuffer
RtlDecompressBuffer
RtlGetCompressionWorkSpaceSize
RtlDeleteElementGenericTableAvl
RtlInsertElementGenericTableAvl
RtlInitializeGenericTableAvl
RtlLookupElementGenericTableAvl
FsRtlDissectName
ExAllocatePoolWithTag
wcsncpy
_stricmp
__C_specific_handler
_local_unwind
ndis.sys
NdisFreeNetBufferListPool
NdisAllocateNetBufferListPool
NdisAllocateGenericObject
NdisFreeGenericObject
fltmgr.sys
FltDeletePushLock
FltGetFileNameInformationUnsafe
FltCloseClientPort
FltStartFiltering
FltRegisterFilter
FltBuildDefaultSecurityDescriptor
FltCloseCommunicationPort
FltUnregisterFilter
FltFreeSecurityDescriptor
FltCreateCommunicationPort
FltAcquirePushLockExclusive
FltInitializePushLock
FltReleasePushLock
FltAcquirePushLockShared
FltSendMessage
FltReleaseFileNameInformation
fwpkclnt.sys
FwpmBfeStateUnsubscribeChanges0
FwpsInjectionHandleDestroy0
FwpsInjectionHandleCreate0
FwpmTransactionCommit0
FwpmCalloutAdd0
FwpmBfeStateSubscribeChanges0
FwpsCalloutUnregisterById0
FwpmTransactionAbort0
FwpmEngineOpen0
FwpmFilterAdd0
FwpsCalloutRegister1
FwpmTransactionBegin0
FwpmEngineClose0
FwpsFreeNetBufferList0
FwpsStreamInjectAsync0
FwpsCopyStreamDataToBuffer0
FwpmBfeStateGet0
FwpsAllocateNetBufferAndNetBufferList0
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ