Static task
static1
Behavioral task
behavioral1
Sample
d13610989c7aa7b7cdb7307346347fb3943db75c025e15f6ccf2dd0b76e7cacf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d13610989c7aa7b7cdb7307346347fb3943db75c025e15f6ccf2dd0b76e7cacf.dll
Resource
win10v2004-20220901-en
General
-
Target
d13610989c7aa7b7cdb7307346347fb3943db75c025e15f6ccf2dd0b76e7cacf
-
Size
73KB
-
MD5
76f211ddd57d968c37e23ea0852ce790
-
SHA1
a0520985c6aa40bd4fe762322958eb6d60b24d37
-
SHA256
d13610989c7aa7b7cdb7307346347fb3943db75c025e15f6ccf2dd0b76e7cacf
-
SHA512
0d0f2989dd38bb2ea5a8d816f9d99609e1fcd2bbcf3950020eb50fbc7dde471af671dcd9e1b9c1e03a48d8d6118caf90315cc4a904213fcb074720b3401020a0
-
SSDEEP
1536:4DnpeN98NiA1ahTYgVyW1knBPmuuMe4f4G:4wN98Ni/XMtZ4G
Malware Config
Signatures
Files
-
d13610989c7aa7b7cdb7307346347fb3943db75c025e15f6ccf2dd0b76e7cacf.dll windows x86
1035eeafb128a704677508e02946e8b8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoSetShareAccess
CcDeferWrite
IoGetDeviceInterfaceAlias
SeDeleteObjectAuditAlarm
RtlxAnsiStringToUnicodeSize
ZwCreateKey
RtlEqualString
RtlAreBitsClear
PsGetCurrentThreadId
ZwQueryValueKey
SeQueryAuthenticationIdToken
ExNotifyCallback
ZwQueryKey
PoRequestPowerIrp
SeTokenIsAdmin
RtlInitUnicodeString
RtlUpperChar
IoGetDriverObjectExtension
RtlInitString
IoAllocateWorkItem
KeSaveFloatingPointState
RtlRandom
RtlEqualUnicodeString
ZwReadFile
ZwOpenFile
IoCreateStreamFileObjectLite
RtlInitializeGenericTable
IoDisconnectInterrupt
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ