Static task
static1
Behavioral task
behavioral1
Sample
c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa.exe
Resource
win10v2004-20230703-en
General
-
Target
c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa
-
Size
31KB
-
MD5
cb61d9194f302ae662922c7445e33fc8
-
SHA1
ceed3ab5909bc805ee37c66e38971bc02f350856
-
SHA256
c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa
-
SHA512
f1c77a1571b8eaf1093f907e0cc0ba97592c08a5a79a4962200867a7069671ee0d3e97c2fe2d39a8b779e1ce693b4715825cd98307cc3818aa64fbb0bf215228
-
SSDEEP
768:MjnW1OodpDUnCVlSokIFQ4JoDu3oN3PQrJngOD0:gW1Vdp+AEpIFPJoDu3O3oND
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa
Files
-
c4944fb5fe6c79812da907e4f84b3a69af3a348a0b95dd79454e06cb353e07fa.exe windows x64
0505023d9074b9227a6f468449f34ad8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlCompareUnicodeString
ExAllocatePool
ExFreePoolWithTag
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByName
IoDriverObjectType
strstr
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
RtlFreeAnsiString
RtlGetVersion
KeDelayExecutionThread
MmProbeAndLockPages
MmUnlockPages
MmGetSystemRoutineAddress
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
MmMapIoSpace
PsCreateSystemThread
IoAllocateMdl
IoFreeMdl
IoGetCurrentProcess
ObReferenceObjectByHandle
ObRegisterCallbacks
ObUnRegisterCallbacks
ZwCreateFile
ZwClose
MmGetPhysicalAddress
PsGetCurrentProcessId
PsGetProcessExitStatus
PsGetProcessId
NtClose
NtAllocateVirtualMemory
NtFreeVirtualMemory
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
PsLookupThreadByThreadId
ZwDeleteFile
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
PsGetProcessPeb
MmCopyVirtualMemory
ZwQuerySystemInformation
__C_specific_handler
strcmp
IoFileObjectType
PsProcessType
PsThreadType
MmHighestUserAddress
NtBuildNumber
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ