Static task
static1
Behavioral task
behavioral1
Sample
271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a.exe
Resource
win10v2004-20230703-en
General
-
Target
271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a
-
Size
245KB
-
MD5
9f69f27a52d6ec963e5f19edac86aa79
-
SHA1
56901620c4625dd16bac247fffc8368e4b658490
-
SHA256
271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a
-
SHA512
0bebd22fefdc4fe16864fd61503d6c6db46b9453d8083db3dad342fc8f7cd322a331a4ef8454b7f5c720bc2c618caabbc039431e6e33060616dbab307319076b
-
SSDEEP
3072:tXrOez2H/3h/Fnn4sufnupa/xa4d8J0XzNex93gT9rbli7DdkOs1BlxDGLqy7+Vy:t7Vzqln4sG/xpOgBblSDdAxDrS/Rz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a
Files
-
271bc8cd958d87c3023e5fd54336abc4d76b6dd0811a7e19b3c4d85c31b0e73a.exe windows x86
15576ae4edd8f991ef6b805c6e0cc18b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExReleaseRundownProtection
ExWaitForRundownProtectionRelease
ExFreePoolWithTag
ObfDereferenceObject
PsLookupProcessByProcessId
memset
_allshl
CmUnRegisterCallback
PsSetCreateProcessNotifyRoutine
PsSetLoadImageNotifyRoutine
PsSetCreateThreadNotifyRoutine
ZwClose
PsCreateSystemThread
MmGetSystemRoutineAddress
KeInitializeEvent
ExInitializeNPagedLookasideList
KeDelayExecutionThread
KeSetEvent
_vsnwprintf
ExReInitializeRundownProtection
CmRegisterCallback
ExAllocatePoolWithTag
RtlEqualUnicodeString
RtlMultiByteToUnicodeN
PsTerminateSystemThread
KeWaitForSingleObject
RtlCopyUnicodeString
IoGetTopLevelIrp
MmIsAddressValid
PsGetCurrentThreadId
PsGetCurrentProcessId
ObQueryNameString
ExInitializeRundownProtection
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
_wcsnicmp
ZwTerminateProcess
ZwOpenProcess
RtlInitializeBitMap
ExReleaseResourceLite
RtlInsertElementGenericTableAvl
ExAcquireResourceExclusiveLite
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
ExAcquireResourceSharedLite
ObfReferenceObject
RtlInitializeGenericTableAvl
ExInitializePagedLookasideList
ExInitializeResourceLite
RtlCompareUnicodeString
memcpy
RtlImageNtHeader
KeQuerySystemTime
MmSystemRangeStart
KeRegisterBugCheckReasonCallback
ExUuidCreate
ExGetPreviousMode
MmUserProbeAddress
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwQuerySystemInformation
ZwQueryInformationFile
ZwOpenFile
_allmul
RtlTimeToTimeFields
ExSystemTimeToLocalTime
IofCompleteRequest
RtlAppendUnicodeToString
ZwCreateFile
ObReferenceObjectByHandle
IoFileObjectType
KeGetCurrentThread
ZwWriteFile
ZwDeleteFile
RtlAppendUnicodeStringToString
RtlPrefixUnicodeString
ZwWaitForSingleObject
ZwQueryDirectoryFile
ZwCreateEvent
ZwFlushKey
ZwSetValueKey
ZwOpenKey
_aulldiv
MmHighestUserAddress
RtlCaptureStackBackTrace
KeTickCount
KeBugCheckEx
InitSafeBootMode
RtlUnwind
KeLeaveCriticalRegion
ExAcquireRundownProtection
RtlInitUnicodeString
ExAcquireRundownProtectionEx
ExReleaseRundownProtectionEx
InterlockedPushEntrySList
IoCreateDevice
IoDeleteDevice
IoRegisterShutdownNotification
IoCreateSymbolicLink
IoUnregisterShutdownNotification
IoRegisterDriverReinitialization
FsRtlIsNameInExpression
RtlUnicodeStringToAnsiString
IoGetDeviceObjectPointer
ZwDeleteKey
ZwQueryValueKey
wcslen
ZwDeleteValueKey
ZwEnumerateKey
ZwEnumerateValueKey
ZwCreateKey
KeClearEvent
KeWaitForMultipleObjects
RtlGetVersion
ZwQueryInformationProcess
ObOpenObjectByPointer
PsProcessType
PsGetProcessCreateTimeQuadPart
KeUnstackDetachProcess
ProbeForRead
KeStackAttachProcess
PsGetProcessPeb
PsThreadType
PsLookupThreadByThreadId
ZwQueryInformationThread
PsIsThreadTerminating
MmUnmapLockedPages
IoFreeMdl
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
IoAllocateMdl
KeInsertQueueApc
KeInitializeApc
ZwMapViewOfSection
ZwCreateSection
ZwUnmapViewOfSection
strcmp
_stricmp
IoGetDeviceAttachmentBaseRef
IoGetRelatedDeviceObject
ZwReadFile
IoCreateFileSpecifyDeviceObjectHint
ZwSetInformationFile
memmove
RtlCompareMemory
ZwSetInformationObject
ZwQueryObject
IoAllocateIrp
IoGetBaseFileSystemDeviceObject
IoFreeIrp
IoCreateFile
ZwDuplicateObject
RtlQueryRegistryValues
KeAreApcsDisabled
ExRaiseStatus
IoVolumeDeviceToDosName
_aullshr
_strnicmp
_allshr
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
RtlDecompressBuffer
FsRtlDissectName
RtlDeleteElementGenericTable
RtlInsertElementGenericTable
RtlLookupElementGenericTable
RtlEnumerateGenericTable
RtlInitializeGenericTable
RtlHashUnicodeString
RtlIsGenericTableEmpty
InterlockedPopEntrySList
KeEnterCriticalRegion
IoRegisterBootDriverReinitialization
hal
KfReleaseSpinLock
KeGetCurrentIrql
KfLowerIrql
KfAcquireSpinLock
ExAcquireFastMutex
ExReleaseFastMutex
fltmgr.sys
FltAcquirePushLockShared
FltInitializePushLock
FltGetFileNameInformationUnsafe
FltReleaseFileNameInformation
FltAcquirePushLockExclusive
FltReleasePushLock
FltDeletePushLock
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ