Static task
static1
Behavioral task
behavioral1
Sample
ab248a181d2f1e48da0308c8e3b0ee68c531e2d347b36160e8dcb126f6103198.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab248a181d2f1e48da0308c8e3b0ee68c531e2d347b36160e8dcb126f6103198.dll
Resource
win10v2004-20220901-en
General
-
Target
ab248a181d2f1e48da0308c8e3b0ee68c531e2d347b36160e8dcb126f6103198
-
Size
135KB
-
MD5
4080bfe4b15b0548aedbf2d54f07fead
-
SHA1
afb46fe1f5dc20f7b4b70eb92bd301eba49b10d8
-
SHA256
ab248a181d2f1e48da0308c8e3b0ee68c531e2d347b36160e8dcb126f6103198
-
SHA512
9649a2322978331d6573d89b6e6a787f148d8927fe250e3324ba5ca1f2e6466367abf1d9dac9695116eeccbae5a68b7222a9fa9ad7552e5803154252dcd142ed
-
SSDEEP
3072:o0yBCVZ/3jeJF4OBmWU7ZEAi0Gv7YHZE76VuLFUSfSEp:o0yk/3jewQmWU7Zpi5YHaVLa7
Malware Config
Signatures
Files
-
ab248a181d2f1e48da0308c8e3b0ee68c531e2d347b36160e8dcb126f6103198.dll windows x86
e926e039dcea035bc41e4b026153ccb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwOpenKey
PsDereferencePrimaryToken
KeInitializeTimer
IoCreateStreamFileObjectLite
RtlEqualUnicodeString
ExFreePool
KeInitializeTimerEx
RtlInitString
FsRtlIsTotalDeviceFailure
RtlIntegerToUnicodeString
RtlUpcaseUnicodeChar
KeSetKernelStackSwapEnable
SeImpersonateClientEx
IoStartTimer
KeBugCheckEx
RtlUpperChar
KeStackAttachProcess
IoCreateNotificationEvent
RtlInitUnicodeString
MmSizeOfMdl
RtlCompareString
RtlEqualString
CcFastMdlReadWait
strcat
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ