Static task
static1
Behavioral task
behavioral1
Sample
2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f.exe
Resource
win10v2004-20230703-en
General
-
Target
2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f
-
Size
49KB
-
MD5
2bb40a7e3e093cd91b9f1608633830c7
-
SHA1
ae080c669000aad487a1ce8291a38642e0c618a5
-
SHA256
2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f
-
SHA512
eabafb387e4cbd40c0367c25707f6871c2b41634d314154a43d6613e2c0c7e154c0d961d4c23d69e28033815d33e812cd89223e2634083abc30efea0592a40f6
-
SSDEEP
1536:3by8jE9jtTTgA2cTmbaKoySOs7ixvGYglkZmfs:Ly8WoaKo37qGqQU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f
Files
-
2b44838220bf25c3439d51cedcf1df1a48e2397492feae786a68808ab544bf2f.exe windows x64
b12ee35d50b236e604750a9f881f2166
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
RtlCompareUnicodeString
RtlFreeUnicodeString
RtlGetVersion
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetSystemRoutineAddress
MmMapLockedPagesSpecifyCache
MmAllocatePagesForMdl
MmFreePagesFromMdl
ObReferenceObjectByHandleWithTag
ObCloseHandle
ObfDereferenceObject
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ZwClose
RtlCompareString
IoCreateFileEx
RtlCaptureContext
MmFlushImageSection
ZwDeleteFile
KeCapturePersistentThreadState
ZwQuerySystemInformation
RtlImageNtHeader
RtlImageDirectoryEntryToData
IoFileObjectType
strlen
_stricmp
strstr
wcsstr
RtlAnsiStringToUnicodeString
RtlEqualUnicodeString
KeDelayExecutionThread
ExGetPreviousMode
MmProbeAndLockPages
MmUnlockPages
MmBuildMdlForNonPagedPool
MmUnmapLockedPages
IoAllocateMdl
IoFreeMdl
IoGetCurrentProcess
ZwOpenFile
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
MmIsAddressValid
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
PsGetProcessId
ZwTerminateProcess
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwWaitForSingleObject
PsGetProcessPeb
PsGetProcessWow64Process
ObReferenceObjectByName
ZwSetSystemInformation
MmCopyVirtualMemory
PsGetProcessImageFileName
IoDriverObjectType
RtlInitAnsiString
RtlInitUnicodeString
strcmp
vmprotectddk64.sys
VMProtectEnd
VMProtectBeginUltra
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ