Static task
static1
Behavioral task
behavioral1
Sample
e72eda06ee9992db7306a636a23b73016fd33b0344464e83faad8a8dcb8ff7b9.sys
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e72eda06ee9992db7306a636a23b73016fd33b0344464e83faad8a8dcb8ff7b9.sys
Resource
win10v2004-20231020-en
General
-
Target
e72eda06ee9992db7306a636a23b73016fd33b0344464e83faad8a8dcb8ff7b9
-
Size
4.3MB
-
MD5
2db7e69ca7797bdc8fb3b3082f7b2b1a
-
SHA1
e7bc4ce68950c60fbf3f78972d88993f43bd55e3
-
SHA256
e72eda06ee9992db7306a636a23b73016fd33b0344464e83faad8a8dcb8ff7b9
-
SHA512
78280d6c1178af7885af01fd6ae2c7a18620e450beeb7dc61a6b534ec4e25e4291ea3d9c104337015b719d24294bc89a2f2f2a1a868834defa6fe56b9426e398
-
SSDEEP
98304:WCs0za/eZb7xebSDuIQ37IKttDaIiISholiTex4zWeIc0f4D77FssW9Q3dRzE:WZ0lxebW7KtFaIioiTeGzWy0Ml/3dy
Malware Config
Signatures
Files
-
e72eda06ee9992db7306a636a23b73016fd33b0344464e83faad8a8dcb8ff7b9.sys windows:6 windows x86 arch:x86
59a08c526fb19d1b566558525f95e587
Code Sign
01Certificate
IssuerCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USNot Before01/01/1995, 08:00Not After31/12/1999, 23:59SubjectCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:fe:6f:00:bd:79:68:42:10:53:40:50:ff:46:bc:92Certificate
IssuerCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USNot Before30/11/2017, 00:00Not After30/11/2018, 23:59SubjectCN=Xingning Dexin Network Technology Co.\, Ltd.,OU=IT,O=Xingning Dexin Network Technology Co.\, Ltd.,L=meizhou xingning,ST=Guangdong,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
79:ad:16:a1:4a:a0:a5:ad:4c:73:58:f4:07:13:2e:65Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before09/05/2001, 23:19Not After09/05/2021, 23:28SubjectCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:19:93:e4:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before22/02/2011, 19:25Not After22/02/2021, 19:35SubjectCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
52:00:e5:aa:25:56:fc:1a:86:ed:96:c9:d4:4b:33:c7Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before08/02/2010, 00:00Not After07/02/2020, 23:59SubjectCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
72:94:04:10:1f:3e:0c:a3:47:83:7f:ca:17:5a:84:38Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before01/11/2005, 13:46Not After01/11/2025, 13:54SubjectCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
01Certificate
IssuerCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USNot Before01/01/1995, 08:00Not After31/12/1999, 23:59SubjectCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation03:23:cc:4e:38:73:5b:0e:6e:fb:a7:6e:a2:5c:73:b7Certificate
IssuerCN=Symantec Class 3 SHA256 Code Signing CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before30/11/2017, 00:00Not After30/11/2018, 23:59SubjectCN=Xingning Dexin Network Technology Co.\, Ltd.,OU=IT,O=Xingning Dexin Network Technology Co.\, Ltd.,L=meizhou xingning,ST=Guangdong,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
3d:78:d7:f9:76:49:60:b2:61:7d:f4:f0:1e:ca:86:2aCertificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before10/12/2013, 00:00Not After09/12/2023, 23:59SubjectCN=Symantec Class 3 SHA256 Code Signing CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
79:ad:16:a1:4a:a0:a5:ad:4c:73:58:f4:07:13:2e:65Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before09/05/2001, 23:19Not After09/05/2021, 23:28SubjectCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:19:93:e4:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before22/02/2011, 19:25Not After22/02/2021, 19:35SubjectCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
72:94:04:10:1f:3e:0c:a3:47:83:7f:ca:17:5a:84:38Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before01/11/2005, 13:46Not After01/11/2025, 13:54SubjectCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
45:8a:24:d6:65:3b:bd:7a:a9:e2:3a:de:e7:1c:7d:db:56:1a:cc:f6:c9:df:48:97:eb:ed:39:55:7b:ea:56:8bSigner
Actual PE Digest45:8a:24:d6:65:3b:bd:7a:a9:e2:3a:de:e7:1c:7d:db:56:1a:cc:f6:c9:df:48:97:eb:ed:39:55:7b:ea:56:8bDigest Algorithmsha256PE Digest Matchestruef3:1d:27:2d:27:ca:4f:fb:05:b2:28:a6:09:c4:00:a7:b8:9d:a8:0aSigner
Actual PE Digestf3:1d:27:2d:27:ca:4f:fb:05:b2:28:a6:09:c4:00:a7:b8:9d:a8:0aDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memset
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
RtlPrefixUnicodeString
RtlAppendUnicodeToString
ObfDereferenceObject
ObOpenObjectByPointer
PsLookupProcessByProcessId
PsGetProcessInheritedFromUniqueProcessId
ZwWriteFile
ZwCreateFile
KeTickCount
KeQueryTimeIncrement
ZwQueryValueKey
IoGetLowerDeviceObject
ObfReferenceObject
IoGetDeviceObjectPointer
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
IoFreeMdl
KeSetEvent
IoFreeIrp
KeWaitForSingleObject
IofCallDriver
KeInitializeEvent
IoAllocateIrp
MmBuildMdlForNonPagedPool
IoAllocateMdl
IofCompleteRequest
RtlRandomEx
ZwOpenFile
ZwQuerySystemInformation
memmove
KeClearEvent
IoGetRelatedDeviceObject
SeCreateAccessState
IoGetFileObjectGenericMapping
ObCreateObject
ObReferenceObjectByHandle
IoFileObjectType
IoCreateFile
RtlConvertSidToUnicodeString
ZwQueryInformationToken
ZwOpenProcessTokenEx
ZwOpenProcess
FsRtlIsNameInExpression
RtlInitUnicodeString
RtlGetVersion
InterlockedPopEntrySList
InterlockedPushEntrySList
KeReleaseMutex
KeInitializeMutex
ExInitializeNPagedLookasideList
KeResetEvent
MmUnlockPages
IoReuseIrp
IoCancelIrp
ZwOpenKey
KeWaitForMultipleObjects
_allmul
ExDeleteNPagedLookasideList
KeDelayExecutionThread
MmProbeAndLockPages
_vsnwprintf
RtlEqualUnicodeString
ZwDeviceIoControlFile
IoVolumeDeviceToDosName
PsTerminateSystemThread
RtlEqualString
RtlInitString
ZwReadFile
PsGetProcessWin32WindowStation
PsGetProcessSessionId
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
ZwFreeVirtualMemory
KeUnstackDetachProcess
KeStackAttachProcess
ZwAllocateVirtualMemory
ExQueueWorkItem
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlWriteRegistryValue
RtlCreateRegistryKey
ZwDeleteFile
ZwLoadDriver
ZwQueryInformationFile
RtlTimeFieldsToTime
PsSetCreateProcessNotifyRoutine
PsRemoveLoadImageNotifyRoutine
IoDeleteDevice
IoUnregisterShutdownNotification
IoRegisterBootDriverReinitialization
PsThreadType
PsCreateSystemThread
PsSetLoadImageNotifyRoutine
IoRegisterShutdownNotification
IoCreateDevice
MmGetSystemRoutineAddress
ZwCreateEvent
ZwOpenEvent
PsGetVersion
ExInitializePagedLookasideList
ExDeletePagedLookasideList
ExInitializeResourceLite
ExDeleteResourceLite
ExAcquireResourceSharedLite
KeEnterCriticalRegion
ExAcquireResourceExclusiveLite
KeLeaveCriticalRegion
ExReleaseResourceLite
RtlUpperString
RtlUpperChar
KeBugCheckEx
RtlUnwind
ZwDeleteKey
ZwQueryKey
ExAllocatePoolWithTag
ZwEnumerateKey
ExFreePoolWithTag
ZwClose
_vsnprintf
KeReadStateEvent
KeGetCurrentThread
ExGetPreviousMode
CmRegisterCallback
ObQueryNameString
MmIsAddressValid
MmUnmapLockedPages
MmMapLockedPagesSpecifyCache
KeServiceDescriptorTable
RtlCompareUnicodeString
memcpy
_except_handler3
RtlImageNtHeader
RtlImageDirectoryEntryToData
_aulldiv
RtlUpcaseUnicodeString
PsGetCurrentProcessId
IoDetachDevice
IoAttachDeviceToDeviceStackSafe
IoBuildDeviceIoControlRequest
IoGetDiskDeviceObject
IoEnumerateDeviceObjectList
IoUnregisterFsRegistrationChange
IoRegisterFsRegistrationChange
FsRtlRegisterFileSystemFilterCallbacks
PsLookupThreadByThreadId
KeInsertQueueApc
KeInitializeApc
MmHighestUserAddress
ExAllocatePool
NtQuerySystemInformation
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
KeQueryActiveProcessors
KeSetSystemAffinityThread
KeRevertToUserAffinityThread
DbgPrint
hal
KfLowerIrql
KeAcquireInStackQueuedSpinLock
KeReleaseInStackQueuedSpinLock
KeGetCurrentIrql
KeRaiseIrqlToDpcLevel
KeQueryPerformanceCounter
Sections
.text Size: - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRY Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.STL Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ