Static task
static1
Behavioral task
behavioral1
Sample
ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1.exe
Resource
win10v2004-20230703-en
General
-
Target
ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1
-
Size
376KB
-
MD5
383817aa43e76d09e6a49d271c7486d7
-
SHA1
e71da29566fd6a04ba4a60d0f1e72643545d5230
-
SHA256
ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1
-
SHA512
ec2bfbf30d2b16b2ff11e66a64090103bc496955cfb2bd7b9f9143a378b6d50adad40ed511548337fbb56ca1b6fbdda727c2c18e83542a0bd4e025da8b73dc04
-
SSDEEP
6144:wci9RmrkaT6YEif3dQL0FjrhnWSW1eHXSJCjGnO/ItSJE:wf/mB6Yt15WS+eHoCk2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1
Files
-
ab6c39225ea7913f914b1037028da4827af86a7a6891b3038da478f3cb6482e1.exe windows x64
7a65213b91d4d1de2d568f61b0b134f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
IoGetCurrentProcess
PsInitialSystemProcess
IoGetDeviceObjectPointer
RtlCompareUnicodeString
ProbeForRead
ExReleaseFastMutex
ExAcquireFastMutex
ProbeForWrite
KeInitializeEvent
PsSetCreateProcessNotifyRoutine
RtlCopyUnicodeString
ExAcquireResourceExclusiveLite
KeLeaveCriticalRegion
RtlDeleteElementGenericTable
KeEnterCriticalRegion
ExAcquireResourceSharedLite
ExReleaseResourceLite
RtlLookupElementGenericTable
RtlEnumerateGenericTable
RtlCompareMemory
ExDeleteResourceLite
ExInitializeResourceLite
RtlInitializeGenericTable
RtlInsertElementGenericTable
ObQueryNameString
CmRegisterCallback
MmHighestUserAddress
ZwFreeVirtualMemory
PsGetCurrentThreadId
PsLookupThreadByThreadId
ZwAllocateVirtualMemory
RtlAppendUnicodeStringToString
MmSystemRangeStart
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
RtlUpcaseUnicodeString
wcsnlen
wcschr
ZwCreateKey
ZwDeleteValueKey
ZwSetValueKey
ZwQueryValueKey
RtlCompressBuffer
RtlDecompressBuffer
ZwOpenKey
RtlGetCompressionWorkSpaceSize
RtlIntegerToUnicodeString
ExSystemTimeToLocalTime
RtlTimeToTimeFields
ExpInterlockedPushEntrySList
ExpInterlockedPopEntrySList
ExDeletePagedLookasideList
ExQueryDepthSList
ExInitializePagedLookasideList
RtlAppendUnicodeToString
CmUnRegisterCallback
_strnicmp
ZwQuerySystemInformation
PsGetProcessId
ZwDeleteFile
ZwQueryInformationFile
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
ZwOpenFile
_wcsicmp
RtlCreateUnicodeString
wcsncpy
wcsncmp
RtlGetVersion
PsCreateSystemThread
RtlUnicodeStringToInteger
ZwEnumerateKey
ZwQueryKey
KeDelayExecutionThread
wcsrchr
PsTerminateSystemThread
RtlImageNtHeader
ExInitializeRundownProtection
PsIsSystemThread
MmMapLockedPagesSpecifyCache
IoGetTopLevelIrp
RtlPrefixUnicodeString
ExWaitForRundownProtectionRelease
ExAcquireRundownProtection
KeResetEvent
ZwQuerySymbolicLinkObject
KeSetEvent
ExReleaseRundownProtection
KeReleaseSpinLock
ZwOpenSymbolicLinkObject
ZwSetInformationThread
KeWaitForSingleObject
KeAcquireSpinLockRaiseToDpc
KeInitializeSemaphore
KeReleaseSemaphore
KeWaitForMultipleObjects
ZwQueryInformationProcess
ObOpenObjectByPointer
PsGetProcessPeb
PsGetProcessCreateTimeQuadPart
KeUnstackDetachProcess
PsGetVersion
ObfReferenceObject
PsGetProcessExitTime
KeStackAttachProcess
RtlQueryRegistryValues
MmUserProbeAddress
RtlWalkFrameChain
PsSetCreateThreadNotifyRoutine
RtlSetBit
RtlTestBit
RtlCaptureStackBackTrace
_wcsnicmp
CmKeyObjectType
IoFileObjectType
KeBugCheckEx
ZwWriteFile
PsGetThreadProcessId
ObfDereferenceObject
PsThreadType
ObReferenceObjectByHandle
PsGetProcessInheritedFromUniqueProcessId
_vsnprintf
RtlHashUnicodeString
RtlEqualUnicodeString
RtlInitAnsiString
ExGetPreviousMode
ZwReadFile
PsLookupProcessByProcessId
PsProcessType
IoThreadToProcess
IoCreateDevice
PsGetCurrentProcessId
IoCreateSymbolicLink
ZwDeviceIoControlFile
IofCompleteRequest
ZwClose
_vsnwprintf
InitSafeBootMode
ZwCreateFile
MmGetSystemRoutineAddress
IoDeleteDevice
RtlInitUnicodeString
IoRegisterShutdownNotification
ExFreePoolWithTag
ZwSetInformationFile
MmUnmapLockedPages
KeInitializeApc
KeInsertQueueApc
IoFreeMdl
MmProbeAndLockPages
PsIsThreadTerminating
MmUnlockPages
MmIsAddressValid
IoAllocateMdl
vDbgPrintEx
FsRtlIsDbcsInExpression
RtlUnicodeStringToAnsiString
FsRtlIsNameInExpression
RtlFreeAnsiString
PsGetCurrentThreadTeb
wcslen
ZwEnumerateValueKey
IoGetBaseFileSystemDeviceObject
IoCreateFile
ZwQueryObject
ZwDuplicateObject
IoFreeIrp
IoAllocateIrp
ZwOpenProcess
ZwSetInformationObject
_stricmp
ExRaiseStatus
KeAreApcsDisabled
ZwMapViewOfSection
IoVolumeDeviceToDosName
ZwUnmapViewOfSection
ExRaiseDatatypeMisalignment
ZwCreateSection
strlen
strcmp
RtlIsGenericTableEmpty
RtlDeleteElementGenericTableAvl
RtlInsertElementGenericTableAvl
RtlInitializeGenericTableAvl
RtlLookupElementGenericTableAvl
FsRtlDissectName
ExAllocatePoolWithTag
__C_specific_handler
_local_unwind
fltmgr.sys
FltDeletePushLock
FltGetFileNameInformationUnsafe
FltClose
FltCreateFile
FltQueryInformationFile
FltSendMessage
FltParseFileNameInformation
FltGetDestinationFileNameInformation
FltAllocateContext
FltSetStreamContext
FltReadFile
FltGetRequestorProcessId
FltGetStreamContext
FltGetVolumeContext
FltGetRequestorProcess
FltSetVolumeContext
FltGetVolumeName
FltReleaseContext
FltGetVolumeProperties
FltAcquirePushLockExclusive
FltReleasePushLock
FltInitializePushLock
FltAcquirePushLockShared
FltReleaseFileNameInformation
FltGetFileNameInformation
FltBuildDefaultSecurityDescriptor
FltFreeSecurityDescriptor
FltCreateCommunicationPort
FltCloseClientPort
FltStartFiltering
FltRegisterFilter
Sections
.text Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ