Static task
static1
Behavioral task
behavioral1
Sample
785a88df11710b19bb7c28eefca2da15b1de7610ef7b51009ea17d0d82a36dd9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
785a88df11710b19bb7c28eefca2da15b1de7610ef7b51009ea17d0d82a36dd9.dll
Resource
win10v2004-20220901-en
General
-
Target
785a88df11710b19bb7c28eefca2da15b1de7610ef7b51009ea17d0d82a36dd9
-
Size
49KB
-
MD5
6ec88acdeed48ee35731e6f4513069e9
-
SHA1
87a578c3fba0fea500ac49dabcfc94cbd8b9925b
-
SHA256
785a88df11710b19bb7c28eefca2da15b1de7610ef7b51009ea17d0d82a36dd9
-
SHA512
1abaedbfcf075c2ac7954b113517dd111411a6b0b2123a4fe7b587d08c025e13d474cf09222586394d7df4dc3295930a48b0c261e1fa250429de7a6aba57a62e
-
SSDEEP
768:Wo4H9o7PUze3deFOMEBRynWVim/9fGZI7a7FngGsimg0N:Wo4IP1eFOMUQmVOZI4bn0N
Malware Config
Signatures
Files
-
785a88df11710b19bb7c28eefca2da15b1de7610ef7b51009ea17d0d82a36dd9.dll windows x86
1f70c12ee5fb053d05fb771f0f3f14f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeInitializeEvent
KeEnterCriticalRegion
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
KeLeaveCriticalRegion
ExAllocatePool
ExFreePoolWithTag
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlInitializeGenericTableAvl
NtOpenFile
NtQueryVolumeInformationFile
NtClose
swprintf
RtlInitUnicodeString
ObReferenceObjectByHandle
IoGetRelatedDeviceObject
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
ExAcquireResourceSharedLite
ZwCreateFile
IoGetStackLimits
MmFlushImageSection
CcInitializeCacheMap
CcPurgeCacheSection
CcSetFileSizes
ZwClose
MmMapLockedPagesSpecifyCache
KeSetEvent
CcFlushCache
CcUninitializeCacheMap
IofCallDriver
IofCompleteRequest
IoSetInformation
CcCopyWrite
FsRtlCopyRead
IoCreateDevice
ZwAllocateVirtualMemory
KeInitializeApc
KeGetCurrentThread
ObfReferenceObject
KeInsertQueueApc
ZwQuerySystemInformation
_stricmp
ZwOpenThread
ZwQueryInformationThread
ExDeleteResourceLite
PsGetProcessPeb
KeStackAttachProcess
ProbeForRead
RtlEqualUnicodeString
KeUnstackDetachProcess
PsLookupProcessThreadByCid
KeDelayExecutionThread
PsCreateSystemThread
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
ZwOpenFile
ZwQueryObject
ZwQueryInformationFile
ZwDeviceIoControlFile
ZwCreateSymbolicLinkObject
ZwCreateDirectoryObject
ZwWriteFile
ZwCreateSection
ZwOpenSection
ZwMapViewOfSection
MmAllocatePagesForMdl
MmUnmapLockedPages
MmFreePagesFromMdl
ZwUnmapViewOfSection
RtlHashUnicodeString
ZwReadFile
IoFreeIrp
RtlPrefixUnicodeString
IoAllocateIrp
KeWaitForSingleObject
ExAllocatePoolWithTag
ZwEnumerateKey
ZwDeleteKey
PoStartNextPowerIrp
PoCallDriver
ZwFlushVirtualMemory
ZwQueryKey
ZwSetSystemInformation
IoCreateDriver
ObMakeTemporaryObject
ZwDeleteFile
ObReferenceObjectByName
IoDriverObjectType
IoEnumerateDeviceObjectList
wcsrchr
ExInitializeResourceLite
IoQueryFileInformation
PsLookupProcessByProcessId
ObfDereferenceObject
_allmul
_except_handler3
memcpy
memset
hal
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ