Static task
static1
Behavioral task
behavioral1
Sample
a146259754c2a02f2191f9a975fa4fdcab0b1dc5df31d465ae420db775cd7db3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a146259754c2a02f2191f9a975fa4fdcab0b1dc5df31d465ae420db775cd7db3.dll
Resource
win10v2004-20220812-en
General
-
Target
a146259754c2a02f2191f9a975fa4fdcab0b1dc5df31d465ae420db775cd7db3
-
Size
106KB
-
MD5
102a235df6fde880c7c054bf2e0d7640
-
SHA1
4f2b4ab049c8198ced45acf012a618374bc13a01
-
SHA256
a146259754c2a02f2191f9a975fa4fdcab0b1dc5df31d465ae420db775cd7db3
-
SHA512
f1360d3244a88a41f639074ab4654e337fb8a73efb02feff3c1cf923bf7eb2b1fc2f0a2f28a2464a98e450deeab7a9c7a3a7df00aad6e64816a755e3bc261987
-
SSDEEP
3072:Sw0dsoP+zUQpJkd06WSlkNcAGtBvZBYHUg+:Sw0LGzUQpJkdxZKGt94Hg
Malware Config
Signatures
Files
-
a146259754c2a02f2191f9a975fa4fdcab0b1dc5df31d465ae420db775cd7db3.dll windows x86
5c42646f79f9f30843a77ae488768c9d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
CcFastCopyWrite
MmIsDriverVerifying
RtlUpperChar
KeInitializeSemaphore
ExFreePoolWithTag
RtlInitString
ExFreePool
KeUnstackDetachProcess
RtlIntegerToUnicodeString
RtlClearAllBits
RtlEqualString
ZwFsControlFile
IoInitializeIrp
RtlCompareString
KeReadStateSemaphore
RtlDeleteNoSplay
KeRegisterBugCheckCallback
ExGetPreviousMode
RtlCompareUnicodeString
strcat
RtlEqualUnicodeString
KeInsertHeadQueue
KeInitializeApc
RtlUpcaseUnicodeString
RtlInitUnicodeString
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ